Articles tagged "Phishing"

Found 69 articles

Nissan has reported that a data breach at Red Hat has compromised the personal information of thousands of its customers. The breach, which occurred in September, has raised concerns about the security of customer data, as it highlights vulnerabilities in third-party services that companies rely on. Nissan has not specified the exact nature of the compromised information, but the incident emphasizes the risks associated with data sharing among businesses. Customers are urged to monitor their accounts for any suspicious activity and to remain vigilant about potential phishing attempts that could arise from the breach. This incident serves as a reminder for companies to assess their security measures and the safeguards in place for customer data.

Impact: Customer personal information
Remediation: Customers should monitor their accounts for suspicious activity and remain vigilant against phishing attempts.
Read Original
Actively Exploited

Fortra has identified a highly active business email compromise (BEC) group known as 'Scripted Sparrow', which is operating across three continents and at least five countries. This group is responsible for sending millions of fraudulent emails each month, targeting businesses and individuals to steal sensitive information and money. The scale of their operations poses a significant risk to organizations globally, as these types of scams can lead to substantial financial losses. Companies need to remain vigilant and implement strong email security measures to protect against this growing threat. Awareness and training for employees on recognizing phishing attempts are also crucial in combating such schemes.

Impact: Businesses and individuals targeted by BEC scams.
Remediation: Implement strong email security measures, employee training on phishing recognition.
Read Original

A recent report from Proofpoint reveals a rise in phishing attacks that take advantage of Microsoft's OAuth device code flow. These campaigns target Microsoft 365 users, tricking them into providing access to their accounts through fake sign-in prompts. The attacks exploit the trust users place in the OAuth process, which is designed to facilitate secure authentication. As a result, individuals and organizations using Microsoft 365 could be at risk of unauthorized access to sensitive information. This surge in phishing attempts underscores the need for heightened awareness and vigilance among users to avoid falling victim to these scams.

Impact: Microsoft 365
Remediation: Users should be cautious of unsolicited sign-in requests and verify the legitimacy of prompts before entering credentials. Implementing multi-factor authentication can also help mitigate risks.
Read Original

In October 2025, Kaspersky reported a new wave of phishing attacks linked to a group known as Operation ForumTroll, specifically targeting Russian scholars. These attackers are using fake emails that appear to come from a legitimate eLibrary service to lure victims into providing sensitive information. This shift from targeting organizations in the spring to focusing on individuals in the fall raises concerns about the attackers' evolving strategies. The origins of the threat actor remain unclear, but the targeted approach suggests a calculated effort to exploit the academic community. Such incidents can lead to significant data breaches and have serious implications for both personal and institutional security.

Impact: Russian scholars, academic institutions
Remediation: Users should verify email sources before clicking links or providing personal information and consider using security training to recognize phishing attempts.
Read Original
Hackers Claim Stealing 94GB of Pornhub Premium User Watch Histories

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A hacking group known as ShinyHunters has reportedly stolen 94GB of data from former Pornhub Premium users, which includes their watch histories. This breach is part of an extortion campaign aimed at these users, raising significant privacy concerns. The attackers utilized a smishing attack, where they sent phishing messages via text to lure victims into revealing personal information. While the specifics of the breach are still being investigated, conflicting reports have emerged about the extent and security of the data involved. This incident underscores the ongoing risks associated with online platforms, particularly regarding user data security and the potential for exploitation by cybercriminals.

Impact: Pornhub Premium user watch histories
Remediation: Users should monitor their accounts for suspicious activity and consider changing passwords. Enabling two-factor authentication can also help enhance security.
Read Original

SoundCloud has confirmed that hackers accessed the personal information of approximately 20% of its user base. The breach raises concerns about the security of user data on the platform, as it affects a significant number of accounts. This incident could lead to potential misuse of the compromised information, such as phishing attacks or identity theft. Users are advised to change their passwords and monitor their accounts for any suspicious activity. SoundCloud's response to the breach will be crucial in restoring user trust and ensuring the security of their systems moving forward.

Impact: SoundCloud user accounts
Remediation: Users should change their passwords and monitor accounts for suspicious activity.
Read Original

Phishing remains a common tactic for cyber attackers, making user training essential for defense. Researchers at the University of Bari conducted studies with 480 participants to evaluate the effectiveness of using AI-generated content for phishing awareness training. The results indicated that training using large language models (LLMs) improved participants' ability to identify suspicious emails. This suggests that integrating AI into training programs could enhance users' resilience against phishing attacks, which is crucial as these tactics continue to evolve. By equipping users with better training, organizations can potentially reduce their vulnerability to these types of cyber threats.

Impact: N/A
Remediation: N/A
Read Original

A recent phishing campaign has been discovered that spreads the Phantom information-stealing malware through ISO file attachments. Attackers are targeting users by disguising these malicious files as legitimate content, tricking them into opening the files and executing the malware. Once installed, Phantom can collect sensitive information, including login credentials and personal data. This campaign poses a significant risk to individuals and organizations, as it can lead to data breaches and identity theft. Users should be cautious when receiving unsolicited emails with attachments, especially ISO files, and ensure their security software is up to date.

Impact: Users of email services and systems that can open ISO files, particularly those who engage with suspicious emails.
Remediation: Users should avoid opening ISO files from unknown sources, ensure email security filters are enabled, and keep antivirus software updated.
Read Original

A new email scam is exploiting PayPal's subscription feature to send deceptive purchase notifications. These emails appear legitimate as they come from PayPal but contain links directing users to fraudulent sites. The scam takes advantage of the way PayPal's subscription system generates email notifications, making it challenging for recipients to discern the authenticity of the messages. Users who fall for these scams could inadvertently share personal information or financial details with malicious actors. It's crucial for PayPal users to be cautious when receiving unexpected purchase notifications and to verify any claims before taking action.

Impact: PayPal users
Remediation: Users should verify email sender addresses, avoid clicking on links in unexpected emails, and report suspicious messages to PayPal.
Read Original

A significant security oversight was uncovered when researchers found an unsecured 16TB MongoDB database that exposed approximately 4.3 billion professional records. This database primarily contained LinkedIn-style data, which could be exploited for large-scale AI-driven social engineering attacks. The discovery was made by Bob Diachenko and nexos.ai on November 23, 2025, and the database was secured only after the researchers alerted its owner. This incident underscores the risks associated with unsecured databases, as the exposed data could facilitate identity theft and phishing schemes targeting professionals. Organizations need to ensure better security measures for their data to prevent such breaches in the future.

Impact: Unsecured MongoDB database, professional records, LinkedIn-style data
Remediation: Database secured after researcher notification; organizations should implement strict access controls and regular security audits.
Read Original
UK’s ICO Fine LastPass £1.2 Million Over 2022 Security Breach

Hackread – Cybersecurity News, Data Breaches, AI, and More

The UK's Information Commissioner's Office (ICO) has imposed a £1.2 million fine on LastPass following a significant data breach in 2022 that compromised the personal information of 1.6 million users. The breach was traced back to a vulnerability in an employee's personal computer, which allowed attackers to access sensitive data. This incident raises serious concerns about the security practices of password management services, especially considering the potential for misuse of the exposed information. Users of LastPass are now at increased risk of phishing attacks and identity theft. The fine serves as a reminder for companies to enhance their cybersecurity measures and protect user data more effectively.

Impact: LastPass user accounts and associated personal data
Remediation: Companies should conduct thorough security audits and ensure employees follow strict cybersecurity protocols, particularly when using personal devices for work.
Read Original
New ‘DroidLock’ Android Malware Locks Users Out, Spies via Front Camera

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Researchers at Zimperium zLabs have discovered a new Android malware called DroidLock, which behaves like ransomware. This malicious software can lock users out of their devices and steal sensitive information by tricking them into providing their credentials through phishing tactics. Additionally, DroidLock has the capability to stream users' screens and activate their front cameras through VNC, raising serious privacy concerns. This malware primarily targets Android users, making it essential for them to remain vigilant about their device security and be cautious of suspicious links or applications. The emergence of DroidLock emphasizes the ongoing risks associated with mobile malware and the need for users to adopt strong security practices.

Impact: Android devices
Remediation: Users should avoid clicking on unknown links, regularly update their devices, and consider using security applications that can detect and mitigate malware.
Read Original
Scammers Sent 40,000 E-Signature Phishing Emails to 6,000 Firms in Just 2 Weeks

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A recent phishing campaign has targeted around 6,000 companies, sending over 40,000 fraudulent emails that appeared to come from trusted services like SharePoint and DocuSign. These emails contained malicious links disguised by reputable redirect services, making it easier for scammers to trick recipients into clicking. The scale and speed of this attack raise concerns about the vulnerability of businesses to such tactics, which exploit the trust users place in well-known platforms. Companies need to be vigilant, as these phishing attempts can lead to data breaches or financial loss if employees fall for the scams. Ensuring proper training and awareness around phishing tactics is crucial for organizations to protect themselves.

Impact: SharePoint, DocuSign, e-signature services
Remediation: Employees should be trained to recognize phishing attempts and verify the authenticity of emails before clicking on links.
Read Original

A new phishing kit named Spiderman is targeting customers of various European banks and cryptocurrency users by creating nearly identical fake websites that impersonate legitimate brands and organizations. This sophisticated kit allows attackers to mimic the look and feel of real banking sites, making it difficult for users to identify them as fraudulent. Affected users may enter sensitive information, such as login credentials or financial details, which could lead to identity theft or financial loss. The rise of such phishing attacks is concerning as they exploit the trust users have in established financial institutions. Awareness and caution are crucial for users to protect themselves from these deceptive schemes.

Impact: European banks and cryptocurrency platforms
Remediation: Users should verify website URLs carefully, enable two-factor authentication where possible, and report any suspicious emails or messages to their bank.
Read Original
Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

Varonis threat analysts have identified a new phishing kit named Spiderman that specifically targets European banks and cryptocurrency customers. This kit automates the process of stealing users' credentials and personal information, creating a complete identity profile of the victim. The implications of this attack are significant, as it not only compromises individual accounts but can also lead to broader financial fraud and identity theft. Banks and crypto platforms should be on high alert and enhance their security measures to protect against this sophisticated threat. Users must also remain vigilant and be cautious about sharing their information online.

Impact: European banks, cryptocurrency platforms
Remediation: Banks and crypto platforms should enhance security protocols, implement two-factor authentication, and educate users on recognizing phishing attempts.
Read Original
PreviousPage 3 of 5Next