A Florida man, linked to the notorious Scattered Spider hacking gang, has pleaded guilty to charges related to cryptocurrency thefts which have netted hundreds of thousands of dollars. Read more in my article on the Hot for Security blog.
Category: phishing
bank fraud, Cloud Security, credit card fraud, fraud detection, friendly fraud, Global Security News, payment fraud, payments, phishing, Security, wire fraud
Payment Fraud Detection and Prevention: Here’s All To Know
Here are the most common and latest advancements in payment fraud strategies and payment fraud prevention tools for protecting your business.
Global Security News, phishing, Podcast, Scam, Smashing Security, Troy Hunt
Smashing Security podcast #411: The fall of Troy, and whisky barrel scammers
Renowned cybersecurity expert Troy Hunt falls victim to a phishing attack, resulting in the exposure of thousands of subscriber details, and don’t lose your life savings in a whisky scam… All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Plus! Don’t…
Cybersecurity, Exploits, gen z, Global Security News, online scams, phishing, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Social Engineering, Threats & Breaches
Gen Z’s Rising Susceptibility to Social Engineering Attacks
Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation. The post Gen Z’s Rising Susceptibility to Social Engineering Attacks appeared first on Security Boulevard.
Artificial Intelligence, Cloud, Cloud Security, Cybersecurity, Global Security News, Microsoft, microsoft security copilot, News, phishing, Security, threat detection
After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot
Microsoft is partnering with top firms to launch new AI security tools, boosting breach analysis, threat detection, and AI model protection across cloud platforms.
Blog, Careers, Global Security News, phishing, phishing training, Security Awareness, Security Bloggers Network
Why So Many Employee Phishing Training Initiatives Fall Short
During the work-from-home boom of 2020, GitLab, a company that largely employs tech-savvy individuals, decided to test its security by sending fake phishing messages to its WFH workers. About one out of every five tested employees fell for it, and […] The post Why So Many Employee Phishing Training Initiatives Fall Short appeared first on…
Coinbase, CryptoCurrency, Global Security News, Guest blog, phishing
Mandatory Coinbase wallet migration? It’s a phishing scam!
An ingenious phishing scam is targeting cryptocurrency investors, by posing as a mandatory wallet migration. Read more in my article on the Hot for Security blog.
Big Data, Cybersecurity, Global Security News, International, phishing, Ransomware, ransomware as a service, Security
Medusa Ransomware Strikes 300+ Targets: FBI & CISA Urge Immediate Action to #StopRansomware
Medusa ransomware now operates as a RaaS model, recruiting affiliates from criminal forums to launch attacks, encrypt data, and extort victims worldwide.
AI, Artificial Intelligence, Event, Global Security News, Password, phishing, Security threats
Webinar: Credential security in the age of AI: Insights for IT leaders
On Tuesday, March 18 2025, at 1pm EST, I will be joining the experts at Dashlane for an online chat all about credential security in the age of AI. Learn more and make sure to book your free seat.
Apple, Canada, CISA, Concerns, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, doge, economy, encryption, Encryption Backdoor, Endpoint, Episodes, Global Security News, Government, Impact, Incompetence, Information Security, infosec, Jokes, national security, phishing, Podcast, Podcasts, privacy, SBN News, Security, Security Bloggers Network, Technology, Trump, uk, Weekly Edition
Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the…
Apple, Canada, CISA, Concerns, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, doge, economy, encryption, Encryption Backdoor, Endpoint, Episodes, Global Security News, Government, Impact, Incompetence, Information Security, infosec, Jokes, national security, phishing, Podcast, Podcasts, privacy, SBN News, Security, Security Bloggers Network, Technology, Trump, uk, Weekly Edition
Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the…
Cybercrime, Cybersecurity, Global Security News, Google Threat Intelligence Group, GRU, messaging apps, phishing, Research, Russia, Sandworm, signal, Threats, Uncategorized
Russia-aligned threat groups dupe Ukrainian targets via Signal
Russian state threat groups have compromised Signal accounts used by Ukrainian military and government personnel to eavesdrop on real-time communications, Google Threat Intelligence Group said in a report released Wednesday. “This is a persistent, ongoing campaign being carried out by multiple different Russia-aligned threat actors,” Dan Black, principal analyst at Google Threat Intelligence Group, said…
Global Security News, Guest blog, Microsoft, Microsoft Teams, North America, phishing, WhatsApp
Got a Microsoft Teams invite? Storm-2372 gang exploit device codes in global phishing attacks
Security experts have warned that a cybercriminal group has been running a malicious and inventive phishing campaign since August 2024 to break into organizations across Europe, North America, Africa, and the Middle East. Read more in my article on the Tripwire State of Security blog.
Cybersecurity, Deep Fake and Other Social Engineering Tactics, Global Security News, phishing, romance scams, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X
Law Enforcement Can’t Save You From Romance Scams
Once a conversation starts and a personal connection is established, scammers behind a screen can lure their targets into video call scams utilizing high-quality deepfake technology The post Law Enforcement Can’t Save You From Romance Scams appeared first on Security Boulevard.
Cybersecurity, Exploits, Global Security News, Microsoft, phishing, Research, Russia, Threat Intelligence, Threats, Volexity
Threat researchers spot ‘device code’ phishing attacks targeting Microsoft accounts
Microsoft threat researchers discovered a series of what they are calling “device code” phishing attacks that allowed a suspected Russia-aligned threat group to gain access to and steal data from critical infrastructure organizations, the company said in research released Thursday. The group, which Microsoft tracks as Storm-2372, has targeted governments, IT services and organizations operating…
BitDefender, comparitech, Cybercrime, Cybersecurity, Exploits, Featured, Global Security News, News, phishing, Scams, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight, valentine's day
Cybercriminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks
As Valentine’s Day approaches, cybercriminals are ramping up their efforts to exploit consumers through romance scams, phishing campaigns and fraudulent e-commerce offers. The post Cybercriminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks appeared first on Security Boulevard.
Global Security News, Guest blog, North America, phishing, SMS
Toll booth bandits continue to scam via SMS messages
North American drivers are continuing to be barraged by waves of scam text messages, telling them that they owe money on unpaid tolls. Do you know what to tell your friends and family to watch out for? Read more in my article on the Hot for Security blog.
Cloud Security, Global Security News, MFA. phishing MFA, phishing, Security, spear phishing
How to Prevent Phishing Attacks with Multi-Factor Authentication
Learn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.
Cybersecurity, Global Security News, NIST phish scale, NIST Phishing Framework, phishing, phishing awareness training, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Threats & Breaches
Using the NIST Phish Scale Framework to Detect and Fight Phishing Attacks
The NIST Phish Scale framework offers a structured and effective approach to improving phishing awareness training in organizations. The post Using the NIST Phish Scale Framework to Detect and Fight Phishing Attacks appeared first on Security Boulevard.
Cloud Security, Cybersecurity, Data Privacy, Data Security, Endpoint, enterprise mobile threats, Featured, Global Security News, Mobile Security, News, PDF files, phishing, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Social Engineering, Spotlight, Threat Intelligence, USPS
Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam
A large-scale phishing campaign is using PDF files and hidden malicious links, as well as posing at the U.S. Postal Service, in phishing campaign targeting mobile device users in hope that victims will divulge credentials and personal information, Zimperium researchers say. The post Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam appeared…
business email compromise, CloudFlare, Cybersecurity, Global Security News, group-1b, Microsoft, Microsoft 365, Microsoft Office, microsoft outlook, phishing, phishing-as-a-service, Security, Sekoia, sneaky 2fa, sneaky log, Social Engineering, Telegram, trac labs, two factor authentication
‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security
The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes.
BforeAI, Bitcoin, Crypto, Cybersecurity, disaster, Exploits, fraud, Global Security News, phishing, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Veriti
California Wildfires Spark Phishing Scams Exploiting Chaos
As Southern California continues to battle devastating wildfires, cybercriminals have seized the opportunity to exploit the chaos, targeting vulnerable individuals and organizations. The post California Wildfires Spark Phishing Scams Exploiting Chaos appeared first on Security Boulevard.
AI, AI executive order, Artificial Intelligence, Bennie Thompson, Biden, Biden administration, Bob Kolasky, Center for Cybersecurity Policy and Law, Center for Democracy & Technology, Center for Democracy and Technology, Chris Inglis, CISA, cloud computing, contracting, critical infrastructure, Cybersecurity and Infrastructure Security Agency, Cybersecurity and Infrastructure Security Agency (CISA), Donald Trump, Emerging Tech, encryption, fraud, Global Security News, Government, House Homeland Security Committee, Joe Biden, Mark Green, National Cyber Director, National Risk Management Center, National Security Council, National Security Council (NSC), Office of the National Cyber Director, operational technology, phishing, quantum computing, supply chain, supply chain security, Trump, Trump Administration
Biden cyber executive order gets mostly plaudits, but its fate is uncertain
A sweeping executive order on cybersecurity released Thursday won largely positive reviews, with the main question being its timing — and what will come of it with the executive branch set to be handed over from president to president. Chris Inglis, the former national cyber director for Joe Biden who has served under both Democrats…
Department of Justice (DOJ), FSB, Geopolitics, Global Security News, Government, Microsoft, phishing, Russia, Star Blizzard, Threats, WhatsApp
Microsoft catches Russian state-sponsored hackers shifting tactics to WhatsApp
The cat-and-mouse game between state-sponsored Russian hackers and one of the world’s biggest technology companies has continued into 2025. Microsoft’s threat intelligence team published research Thursday examining how a state-sponsored Russian threat actor group, known as Star Blizzard, has altered its longstanding attack strategies to target WhatsApp accounts. This attack vector is a significant change…
Emerging Tech, Global Security News, phishing
Phishing click rates tripled in 2024 despite user training
For years organizations have invested in security awareness training programs to teach employees how to spot and report phishing attempts. Despite those efforts, enterprise users were three times as likely in 2024 to land on phishing pages compared to the previous year, according to a report from security vendor Netskope. Based on telemetry collected from…
2FA, CryptoCurrency, Global Security News, Google, Guest blog, Kraken, password manager, phishing
Canadian man loses a cryptocurrency fortune to scammers – here’s how you can stop it happening to you
A Canadian man lost a $100,000 cryptocurrency fortune – all because he did a careless Google search. Read more in my article on the Hot for Security blog.
2024, 2025, Analytics & Intelligence, Cybersecurity, Exploits, Featured, GenAI, Global Security News, Netskope, News, phishing, Security Awareness, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight, Threats & Breaches, vulnerabilities
Phishing Threats, GenAI Among Top Cybersecurity Risks in 2025
Organizations are facing escalating threats from phishing attacks, personal app usage and the widespread adoption of generative AI (GenAI) in workplaces. According to a Netskope report, phishing attacks surged in 2024, with enterprise employees clicking on phishing links at a rate nearly three times higher than in 2023. The study found phishing campaigns have evolved..…
Browsers, clickjacking, Cybersecurity, Exploits, Global Security News, phishing, Security Bloggers Network
Two Clicks to Chaos: How Double-clickjacking Hands Over Control of Apps without Users Knowing
In our last blog, we discussed how OAuth-based consent phishing attacks have been used to trick users into giving malicious apps the permission to conduct malicious activities via an employee’s account. This attack has been extremely effective due to the lack of awareness of how attackers can misuse OAuth permissions. Now, let’s say we are…
Cybersecurity, Exploits, Featured, Global Security News, News, phishing, plugin, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Spotlight, Threats & Breaches, wordpress
WordPress Plugin Exploited to Turn Legitimate Sites Into Phishing Traps
A WordPress plugin known as PhishWP, has been discovered on Russian cybercrime forums and is being exploited by cybercriminals to steal sensitive data from unsuspecting users. The post WordPress Plugin Exploited to Turn Legitimate Sites Into Phishing Traps appeared first on Security Boulevard.
Cybersecurity, Global IT News, Global Security News, identity, Identity & Access, infosec, phishing, SaaS, Security Bloggers Network
Consent Phishing: The New, Smarter Way to Phish
What is consent phishing? Most people are familiar with the two most common types of phishing — credential phishing and phishing payloads, where attackers trick users into revealing credentials and downloading malicious software respectively. However, there is a third type of phishing on the rise: consent phishing. Consent phishing deceives users into granting a third-party SaaS application…
2024, 2025, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, Episodes, Global Security News, Happy New Year, Information Security, infosec, New Year, phishing, Podcast, podcasting, Podcasts, Port 83, predictions, privacy, Security, Security Bloggers Network, Social Engineering, Technology, Weekly Edition, Year End Reflections
2024 Year in Review: What We Got Right and Looking to 2025
In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporters and special guests. Plus, stay tuned for our predictions…
Android, Apple, Cybersecurity, encryption, Global Security News, Google, identity theft, Microsoft, Mobile Security, password manager, phishing, privacy, Ransomware, Security, spam, TR Academy, trend micro
Protect 3 Devices With This Maximum Security Software
Trend Micro guards desktop and mobile devices from ransomware, phishing schemes, spam, and more for one year.
agentic ai, Blog, generative ai, Global Security News, phishing, Security Bloggers Network, SentinelOne, XDR
The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce
As artificial intelligence evolves, its impact on cybersecurity and the workforce is profound and far-reaching. Predictive AI once enabled security teams to anticipate threats, and generative AI brought creativity and automation to new levels. Now, we stand at the threshold […] The post The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the…
2025, cyber, Cybersecurity, Global Security News, Insider Threats, phishing, Ransomware, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Threats & Breaches, trends, vulnerabilities
Acumen Threat Analysis: Preparing for 2025
Phishing continues to be the threat vector of choice for adversaries, ransomware continues to deliver the desired financial and destructive results for attackers, while organizations, both public and private, are growing increasingly concerned about the risks posed by insiders. The post Acumen Threat Analysis: Preparing for 2025 appeared first on Security Boulevard.
Fake anti-virus, Global Security News, Google, Google ads, Guest blog, malvertising, malware, phishing, Ransomware, Scam, seo, technical support scam
Tech support scams leverage Google ads again and again, fleecing unsuspecting internet users
It’s not a new technique, but that doesn’t mean that cybercriminals cannot make rich rewards from SEO poisoning. Read more in my article on the Tripwire State of Security blog.
@chenlun, A Little Sunshine, and Mobile Anti-Abuse Working Group, Anti-Phishing Working Group, Coalition Against Unsolicited Commercial Email, Global Security News, ICANN, Interisle Consulting, Internet Corporation for Assigned Names and Numbers, John Levine, Latest Warnings, malware, Messaging, new gTLDs, North America, phishing, spam, The Coming Storm, U.S. Postal Service
Why Phishers Love New TLDs Like .shop, .top and .xyz
Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) — such as .shop, .top, .xyz — that attract scammers with rock-bottom prices and no meaningful registration requirements, new research finds. Meanwhile, the nonprofit entity that oversees…