#phishing

[ follow ]
fromThe Hacker News
13 hours ago

Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

"Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host malware configurations," McAfee Labs researchers Harshil Patel and Prabudh Chakravorty said in a report. "When law enforcement or security researchers shut down their C2 infrastructure, Astaroth simply pulls fresh configurations from GitHub and keeps running."
Information security
#phishing-as-a-service
Information security
fromArs Technica
3 days ago

"Payroll Pirate" phishing scam that takes over Workday accounts steals paychecks

Attackers use phishing and adversary-in-the-middle techniques to steal Workday credentials and MFA codes, then change payroll settings to divert direct-deposit payments to their accounts.
Cryptocurrency
fromcointelegraph.com
3 days ago

Crypto safety 2025: 7 easy ways to avoid hacks and scams

Everyday phishing, malicious approvals, and SIM swaps cause most crypto thefts; phishing-resistant 2FA, careful signing, wallet separation, clean devices, and recovery plans greatly reduce risk.
Information security
fromThe Hacker News
3 days ago

Microsoft Warns of 'Payroll Pirates' Hijacking HR SaaS Accounts to Steal Employee Salaries

Storm-2657 hijacks employee HR SaaS accounts via phishing and AitM attacks, then redirects salary payments to attacker-controlled bank accounts by modifying payment settings.
#cybercrime
fromDataBreaches.Net
3 weeks ago
Information security

Microsoft seizes 338 websites to disrupt rapidly growing 'RaccoonO365' phishing service - DataBreaches.Net

fromDataBreaches.Net
3 weeks ago
Information security

Microsoft seizes 338 websites to disrupt rapidly growing 'RaccoonO365' phishing service - DataBreaches.Net

#cybersecurity
fromZDNET
1 week ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromBusiness Insider
4 weeks ago
Information security

I'm a principal security engineer at Microsoft. Here are 5 things you should know if you're interested in working in cybersecurity.

fromIT Pro
1 month ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

fromZDNET
1 week ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromBusiness Insider
4 weeks ago
Information security

I'm a principal security engineer at Microsoft. Here are 5 things you should know if you're interested in working in cybersecurity.

fromIT Pro
1 month ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

#npm
fromZDNET
1 month ago
Information security

This 2FA phishing scam pwned a developer - and endangered billions of npm downloads

fromZDNET
1 month ago
Information security

This 2FA phishing scam pwned a developer - and endangered billions of npm downloads

fromThe Hacker News
4 days ago

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. "Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front camera; and even send SMS messages or place calls directly from the victim's device," Zimperium researcher Vishnu Pratapagiri said in a report shared with The Hacker News.
Information security
Information security
fromChannelPro
4 days ago

DNS Security 101: Safeguarding your business from cyber threats

Organizations must strengthen DNS security to prevent phishing, malware distribution, domain and subdomain hijacking, and other cyberattacks exploiting lookalike domains.
#ai-misuse
fromTechzine Global
5 days ago
Artificial intelligence

OpenAI reports growing misuse of AI by states and criminals

OpenAI disrupted international networks using its models for cyberattacks, scams, and political influence while strengthening defenses to block and detect malicious AI use.
fromBusiness Insider
4 weeks ago
Information security

Fake military IDs, bogus resumes: How North Korean and Chinese hackers use AI tools to infiltrate companies and other targets

North Korean and Chinese hackers use AI tools like ChatGPT and Claude to create fake IDs, résumés, and phishing materials to enable espionage and unauthorized access.
fromBusiness Insider
4 weeks ago
Information security

Fake military IDs, bogus resumes: How North Korean and Chinese hackers use AI tools to infiltrate companies and other targets

Information security
fromTechzine Global
5 days ago

Kaseya acquires INKY for AI-driven email security

Kaseya's acquisition of INKY equips MSPs with generative-AI and behavioral-analysis email protection to detect and respond to advanced phishing attacks.
Information security
fromThe Hacker News
6 days ago

XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

XWorm is a modular, evolving malware platform enabling data theft, persistence, remote control, and other attacks through plugins and phishing-based distribution.
Information security
fromBusiness Matters
1 week ago

Online Justice Takes Aim at Rising Phishing and Money Scams with Recovery Services

Link-based phishing can swiftly steal personal data and funds; immediate, structured recovery using human expertise and cyber-intelligence improves victim outcomes and disrupts fraud.
UK news
fromwww.theguardian.com
1 week ago

Six out of 10 UK secondary schools hit by cyber-attack or breach in past year

UK educational institutions face disproportionately high cyber-attacks, with schools and universities frequently targeted by phishing, access-broker-facilitated breaches, and ransomware.
Information security
fromThe Hacker News
1 week ago

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

SORVEPOTEL is self-propagating malware spreading via WhatsApp to compromise Windows systems in Brazil, prioritizing rapid propagation over data theft or ransomware.
Information security
fromThe Hacker News
1 week ago

New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT

Cavalry Werewolf, linked to YoroTrooper, targets Russian state agencies using FoalShell and StallionRAT delivered via Kyrgyzstan-themed phishing and malicious RARs.
Information security
fromIT Pro
1 week ago

Foreign states ramp up cyber attacks on EU with AI-driven phishing and DDoS campaigns

EU public administration faces intense state-aligned cyberespionage; phishing drives initial intrusions, hacktivist DDoS dominates incident counts, and vulnerability exploitation remains significant.
Information security
fromTalentLMS Blog
1 week ago

10 Essential Cybersecurity Topics for Employee Training

Comprehensive cybersecurity training for all employees prevents breaches, protects data, preserves customer trust, and reduces financial, legal, and reputational damage.
Information security
fromSecuritymagazine
1 week ago

Cybersecurity Awareness Month Is a Reminder: Phishing Prevention Is Year-Round

Generative AI significantly increases phishing effectiveness by lowering skill barriers and creating highly authentic, hard-to-detect malicious messages, worsening global phishing prevalence.
#security-training
fromZDNET
2 weeks ago
Information security

Phishing training doesn't stop your employees from clicking scam links - here's why

fromZDNET
2 weeks ago
Privacy professionals

Employees learn close to nothing from phishing training, and this is why

fromZDNET
2 weeks ago
Information security

Phishing training doesn't stop your employees from clicking scam links - here's why

fromZDNET
2 weeks ago
Privacy professionals

Employees learn close to nothing from phishing training, and this is why

Information security
fromThe Hacker News
2 weeks ago

Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security

Threat actors used LLM-generated code to obfuscate SVG-based phishing payloads targeting U.S. organizations, enabling credential theft while evading security defenses.
Information security
fromThe Hacker News
2 weeks ago

Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam

Phishing campaign impersonating Ukrainian agencies uses SVG-based emails to deliver CountLoader that installs Amatera Stealer and PureMiner (fileless .NET, process hollowing).
fromZDNET
2 weeks ago

Employees learn nothing from phishing security training, and this is why

The , conducted by UC San Diego Health and Censys researchers, found that phishing-related cybersecurity training programs had no effect on whether or not employees were duped by phishing emails. After analyzing the results of 10 different phishing email campaigns sent to over 19,500 employees at UC San Diego Health over eight months, the researchers found "no significant relationship between whether users had recently completed an annual, mandated cybersecurity training and the likelihood of falling for phishing emails."
Tech industry
#pypi
Toronto
fromwww.cbc.ca
2 weeks ago

Phishing scam targeting U of T students, demanding payment for outstanding fees, police warn | CBC News

Students are being targeted by phishing emails impersonating the University of Toronto demanding immediate e-transfer payments for alleged outstanding tuition.
Information security
fromTheregister
2 weeks ago

Kaspersky: RevengeHotels returns with AI-coded malware

RevengeHotels uses AI-generated malware to enhance hotel phishing attacks, producing variants that evade detection and increase risk of guest card and personal data theft.
Information security
fromZDNET
3 weeks ago

FBI warns its scam reporting site is being spoofed - how to avoid getting tricked

Scammers are creating spoofed websites impersonating the FBI’s IC3 to steal personal and financial information and facilitate monetary scams.
Information security
fromThe Hacker News
3 weeks ago

ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks

ComicForm conducted phishing since April 2025 targeting Belarus, Kazakhstan, and Russia to deploy Formbook via multi-stage .NET malware.
Information security
fromSecurityWeek
3 weeks ago

FBI Warns of Spoofed IC3 Website

Threat actors are spoofing the FBI IC3 website to steal personal and financial information; users should access www.ic3.gov directly and avoid suspicious links.
Information security
fromInfoWorld
3 weeks ago

NPM attacks and the security of software supply chains

Process improvements and sustainable funding provide far more protection for open-source software supply chains than isolated technical guardrails.
#revengehotels
#ta415
Information security
fromBusiness Matters
3 weeks ago

The Role of IT Support in Cyber Security Awareness Training

Effective cyber security awareness training led by IT support teams reduces human error, prevents breaches, and makes cyber safety second nature across organizations.
Information security
fromPCWorld
3 weeks ago

Protect your small business from remote working's biggest security nightmares

Small businesses must secure remote and hybrid work to protect employees, data, finances, and reputation from threats such as man-in-the-middle and phishing attacks.
fromComputerWeekly.com
3 weeks ago

Microsoft scores win against Office 365 credential thieves | Computer Weekly

Investigators from Microsoft's Digital Crimes Unit (DCU) have disrupted the network behind the dangerous RaccoonO365 infostealer malware that targeted the usernames and credentials of Office 365 users after being granted a court order in the Southern District of New York. The operation saw a total of 338 websites linked to the popular malware seized and its technical infrastructure disrupted, severing RaccoonO365 users' access to their victims.
Information security
Information security
fromSecuritymagazine
3 weeks ago

When Employees Help Hackers: How Threat Actors Bypass MFA

Criminals increasingly bypass MFA by tricking employees with sophisticated phishing, driving business email compromise and largely irretrievable wire fraud losses.
Information security
fromTheregister
3 weeks ago

Microsoft, Cloudflare shut down RaccoonO365 phishing domains

Microsoft seized 338 RaccoonO365 websites and identified leader Joshua Ogundipe, disrupting a subscription-based phishing service that stole Microsoft 365 credentials.
Information security
fromThe Hacker News
3 weeks ago

New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

A FileFix variant is being used to deliver StealC malware via phishing pages that trick users into executing commands and downloading malicious images from Bitbucket.
Information security
fromFortune
4 weeks ago

North Korean hackers used ChatGPT to help forge deepfake ID | Fortune

A suspected North Korean hacking group used ChatGPT to create a deepfake military ID image to support a phishing attack on a South Korean target.
Information security
fromBusiness Insider
1 month ago

Holiday shopping is just around the corner, and so are the shipping scams

Ending the de minimis exemption means low-value international packages now face duties, creating confusion that scammers exploit with fake customs and delivery notices.
#data-breach
fromIT Pro
1 month ago
Information security

LNER warns customers to remain vigilant after personal data exposed in cyber attack

fromIT Pro
1 month ago
Information security

LNER warns customers to remain vigilant after personal data exposed in cyber attack

fromTechCrunch
1 month ago

Google's former security leads raise $13M to fight email threats before they reach you | TechCrunch

As AI is increasingly helping hackers to launch mass-scale email attacks, former Google security leaders have joined forces to build autonomous AI agents that aim to stop phishing, malware, and business email compromise threats before they ever reach user inboxes. That is the mission behind AegisAI, a new email security startup that has just emerged from stealth with $13 million in seed funding co-led by Accel and Foundation Capital.
Information security
fromThe Nation
1 month ago

We're Living in an Age of Scams

Purported Microsoft employees tried to get control of my computer by claiming it was about to self-destruct. (My husband almost fell for that one.) I got numerous realistic-sounding robocalls asking for donations to charities that probably don't exist. Women with lovely telephone voices claimed to have discovered my 2009 book of poems and told me their companies could make it a big commercial success.
Information security
Information security
fromThe Hacker News
1 month ago

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

Threat actors exploit Axios and Microsoft Direct Send to spoof trusted senders, bypass gateways, and drive highly successful phishing and account takeover campaigns across industries.
Information security
fromThe Hacker News
1 month ago

From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks

MostereRAT uses EPL-developed staged payloads, mTLS-protected C2, security-tool disabling, and plugin deployment to gain full control and stealthily persist on infected systems.
#icloud-calendar
#stealerium
Information security
fromTechzine Global
1 month ago

Varonis acquires SlashNext for email security

SlashNext's multi-channel phishing detection combined with Varonis' AI-driven data security enables earlier detection and prevention of AI-powered social-engineering attacks before data breaches occur.
Information security
fromThe Hacker News
1 month ago

VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages

Attackers use obfuscated SVG files with embedded JavaScript to deliver Base64-encoded phishing pages impersonating Colombia's judiciary and trigger hidden ZIP malware downloads.
Information security
fromChannelPro
1 month ago

Varonis snaps up AI email security specialist SlashNext

Varonis will acquire SlashNext to integrate AI-native multi-channel phishing detection into its platform, enhancing protection against AI-generated threats across email and messaging.
#gmail
#upcrypter
fromwww.theguardian.com
1 month ago

The good news is, you're owed a tax refund. The bad news? It's a scam

Tax calculations can be, well, taxing, so a message from HMRC saying that there's been a mistake may not ring too many alarm bells. Some bring good news: you have overpaid and are owed a refund, but others claim you owe money. In both cases there's an imminent deadline to act sometimes with the threat of legal action, or penalties if you don't. Scammers are taking advantage of people's fears over bills to steal personal and banking information.
Information security
fromWIRED
1 month ago

Scammers Will Try to Trick You Into Filling Out Google Forms. Don't Fall for It

These forms can be created in minutes, with clean and clear formatting, official-looking images and video, and-most importantly of all-a genuine Google Docs URL that your web browser will see no problem with. Scammers can then use these authentic-looking forms to ask for payment details or login information. It's a type of scam that continues to spread, with Google itself issuing a warning about the issue in February.
Information security
Artificial intelligence
fromTechzine Global
1 month ago

Anthropic blocks misuse of Claude for cybercrime

Anthropic blocked attempts to misuse Claude for phishing, malware development, filter circumvention, and influence campaigns, banning accounts and tightening filters to mitigate risks.
#identity-security
fromTheregister
1 month ago
Information security

Report declares 'identity crisis' amid rising login attacks

Security leaders increasingly distrust identity providers due to complexity, poor visibility, inadequate MFA coverage, and rising credential-focused attacks.
fromSecuritymagazine
1 month ago
Privacy professionals

Survey Reveals Top Challenges of Implementing Identity Security

A significant gap exists between the need for identity security and its implementation across organizations.
Information security
fromEntrepreneur
1 month ago

AI-Driven Scams Are Draining Retirement Funds | Entrepreneur

The Phantom Hacker Scam uses AI-driven, three-pronged phishing to steal seniors' retirement funds through tech support, bank, and government impersonation.
Information security
fromTechzine Global
1 month ago

Phishing campaign targets Teams and Zoom with RMM tool

Attackers hijack ConnectWise ScreenConnect via AI-driven phishing that impersonates Zoom/Teams, using cloud obfuscation to gain administrator access and enable lateral movement and credential theft.
Science
fromSecuritymagazine
1 month ago

Agentic AI Browsers Exploited by "PromptFix" Trick Technique

A new prompt injection technique uses fake CAPTCHA pages to trick generative AI agents into executing malicious actions and visiting lookalike storefronts.
Information security
fromIT Pro
1 month ago

Employee distraction is now your biggest cybersecurity risk

Distracted and undertrained staff, not sophisticated threats, cause the majority of cyber incidents, with phishing as the primary attack vector.
fromAbc
1 month ago

How a request for a video of a dress led to the seller losing $950

"Usually, I am pretty onto it and I have helped other friends avoid scams," she said. "For it to happen to me ... this situation got me off guard."
E-Commerce
Information security
fromThe Hacker News
1 month ago

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Phishing emails deliver RAR archives whose filenames contain Base64-encoded Bash commands that execute VShell via shell command injection when file names are parsed.
#tax-scams
Information security
fromLifehacker
1 month ago

This Creative Phishing Scam Uses Netflix Job Offers to Steal Facebook Credentials

Scammers impersonate Netflix recruiters to phish jobseekers, steal Facebook credentials, and compromise business accounts to run malicious ads or demand ransoms.
Information security
fromABC7 Los Angeles
1 month ago

Don't click on that text claiming to be from Amazon. Here's what to know about the scam

Scammers send fake Amazon texts claiming refunds or recalls to phish for personal information and money; verify via the Amazon app/website and report spam to 7726.
Privacy professionals
fromTechCrunch
2 months ago

After researchers unmasked a prolific SMS scammer, a new operation has emerged in its wake | TechCrunch

A prolific SMS scam operation has targeted victims by impersonating delivery and toll notifications to steal credit card information.
[ Load more ]