SoundCloud has experienced a significant data breach, affecting nearly 30 million user accounts. Hackers accessed personal and contact information, raising concerns about user privacy and security. This breach underscores the vulnerability of online platforms to cyberattacks, highlighting the need for stronger security measures. Users whose accounts were compromised should be vigilant about potential phishing scams and consider changing their passwords. SoundCloud has not yet detailed how the breach occurred, leaving many questions about the effectiveness of their security protocols.
Articles tagged "Phishing"
Found 118 articles
FortiGuard Labs has reported a multi-stage phishing campaign aimed at users in Russia, utilizing fake business documents as bait. This attack serves to distract victims while the Amnesia RAT malware operates in the background, potentially leading to ransomware deployment. The campaign is particularly concerning as it targets individuals and organizations that may not be aware of the risks associated with unsolicited documents. As attackers continue to refine their tactics, users need to remain vigilant and cautious about opening attachments from unknown sources. The implications of such attacks can be significant, leading to data breaches and financial losses for those affected.
SCM feed for Latest
Cybersecurity experts have discovered that cybercriminals are using fake CAPTCHA verification pages to distribute malware. These fraudulent pages mimic legitimate CAPTCHA forms, tricking users into interacting with them. When users attempt to complete the CAPTCHA, they inadvertently download malware onto their devices. This tactic is particularly concerning because it exploits a common security feature that many people trust. Users and organizations need to be vigilant about unexpected CAPTCHA prompts and ensure they are on legitimate websites before entering any information. This incident serves as a reminder of the evolving methods attackers use to bypass security measures.
Crunchbase has confirmed a data breach after the hacking group ShinyHunters announced that they stole over 2 million personal records from the company. The breach was made public when ShinyHunters leaked a 402 MB compressed archive containing the data on their website, which they did following a failed attempt at extorting Crunchbase. This incident raises concerns for users whose personal information may be exposed, potentially leading to identity theft or phishing attacks. Crunchbase's confirmation of the breach underscores the ongoing risks that companies face in securing sensitive user data. The situation highlights the need for organizations to bolster their cybersecurity measures to prevent similar incidents in the future.
Infosecurity Magazine
Researchers from Fortra have identified a new SEO poisoning scheme named 'HaxorSEO.' This operation aims to manipulate search engine results to direct unsuspecting users to malicious websites. The attackers exploit popular search terms to increase the visibility of their harmful content, which can lead to malware infections or phishing attempts. This discovery is significant because it highlights the ongoing tactics used by cybercriminals to deceive users and compromise their security. Companies and internet users need to be vigilant about the links they click on, especially those appearing in search results, to avoid falling victim to these kinds of attacks.
Infosecurity Magazine
Okta has reported a new type of vishing attack where scammers impersonate IT support teams to steal user credentials. These attackers create fake login pages in real-time using phishing kits, which makes it challenging for victims to detect the fraud. This method allows them to bypass multi-factor authentication (MFA), a security measure that many organizations use to protect sensitive information. Users who fall for this trick may unknowingly provide their login details, putting their accounts and sensitive data at risk. Companies should remain vigilant and educate employees about these tactics to prevent successful attacks.
A new malware toolkit called 'Stanley' is being sold on cybercrime forums for between $2,000 and $6,000. This toolkit enables attackers to create counterfeit websites that mimic legitimate ones, facilitating phishing attacks. The post claims that the toolkit can publish these fraudulent sites on the Chrome Web Store, increasing their visibility and potential for success. This poses a significant risk to users who may unknowingly provide sensitive information to these spoofed sites. The emergence of such tools highlights the ongoing challenges in combating online fraud and the need for users to be vigilant when navigating web applications.
Researchers at Check Point have linked an active phishing campaign to the North Korean hacking group KONNI, also known by several other names. This campaign specifically targets software developers and engineers, using deceptive emails that present fake documentation related to blockchain projects. The attackers are employing an AI-generated PowerShell backdoor to infiltrate systems. This tactic not only showcases the group's evolving methods but also raises concerns about the security of developers working in the rapidly growing blockchain sector. The implications are significant, as successful compromises could lead to data theft and further exploitation of vulnerabilities within the tech community.
Infosecurity Magazine
Under Armour is currently investigating a data breach that may have exposed approximately 72 million records. The company has stated that, so far, there is no evidence suggesting that the breach affected systems responsible for processing payments or storing customer passwords. This incident raises concerns about the potential exposure of personal data, which could include details such as email addresses and other sensitive information. For users of Under Armour's services, the situation is alarming as it may lead to phishing attempts or identity theft. The company is taking steps to understand the full scope of the breach and to protect its customers moving forward.
BleepingComputer
Okta has issued a warning about a new wave of attacks targeting its Single Sign-On (SSO) accounts through voice phishing, or vishing. Attackers are using custom phishing kits designed specifically for these social engineering tactics to trick users into revealing their Okta SSO credentials. This breach affects organizations that rely on Okta for secure login processes, potentially exposing sensitive data if attackers gain access. As these attacks are currently active, users are urged to remain vigilant and verify any requests for sensitive information they receive via phone. This situation emphasizes the need for enhanced security measures and user education on recognizing vishing attempts.
Infosecurity Magazine
LastPass is warning users about a phishing campaign that is attempting to steal their master passwords. Fraudulent emails are being sent to LastPass users, claiming they need to back up their accounts within 24 hours. The company has confirmed that it would never request such an action, indicating that these emails are not legitimate. This phishing attempt poses a risk as it could lead to unauthorized access to users' sensitive information if they fall for the scam. Users are advised to remain vigilant and to disregard any such messages that ask for urgent account actions.
SCM feed for Latest
A recent report from Corporation Service Co. (CSC) indicates that a significant number of Global 2000 companies are falling short on domain security. Specifically, 67% of these companies have implemented fewer than half of the recommended security measures for their domains. This lack of adequate protection raises concerns about the vulnerability of these major organizations to cyber threats, such as phishing and domain spoofing. Without proper domain security practices, companies risk their reputation and data integrity, which can lead to financial losses and customer trust issues. The findings serve as a wake-up call for businesses to prioritize their domain security strategies and adopt necessary measures to safeguard their online presence.
Infosecurity Magazine
A loan phishing scam in Peru is targeting individuals by mimicking legitimate financial institutions. Attackers create fake applications that trick users into providing sensitive information, including credit card details and personal identification numbers (PINs). This scam has raised concerns as it exploits the growing demand for loans, especially among those seeking financial assistance. Victims are at risk of identity theft and financial loss, making it crucial for users to be vigilant about the applications they download and the information they share. Authorities urge the public to verify the authenticity of loan offers and report suspicious activities to prevent further exploitation.
BleepingComputer
Phishing attacks are becoming more sophisticated and harder to detect, focusing on exploiting human emotions and timing rather than just careless users. Researchers from Flare have revealed that modern phishing tactics have evolved into industrialized operations, making them scalable and more challenging for individuals to recognize. This shift highlights the need for users to be more vigilant and educated about potential scams. Phishing can lead to severe consequences, including financial loss and data breaches, affecting both individuals and organizations. As these tactics grow in complexity, it's crucial for everyone to understand the risks and recognize the signs of phishing attempts.
SCM feed for Latest
Ingram Micro, a major technology distributor, experienced a data breach that compromised the personal information of approximately 42,000 individuals. The breach was detected on July 3, 2025, prompting the company to initiate an investigation with cybersecurity experts to assess the extent of the incident. The affected data may include sensitive details, although specifics about what information was accessed have not been disclosed. This incident raises concerns about the security practices in place at Ingram Micro and the potential risks faced by those whose information was exposed. As the investigation continues, affected individuals should remain vigilant for any signs of identity theft or phishing attempts.