Articles tagged "Phishing"

Found 180 articles

The Hidden Cyber Risks of Remote Work Infrastructure

Hackread – Cybersecurity News, Data Breaches, AI and More

The rise of remote work has brought about several hidden cybersecurity risks that can leave both businesses and employees exposed to potential breaches. Key issues include insecure home Wi-Fi networks, which can be easily compromised by attackers, as well as phishing attacks that target remote workers. Additionally, there is a risk of data exposure, particularly if employees are not following proper security protocols. These vulnerabilities can lead to significant consequences for organizations, including data loss and financial damage. It's essential for companies to address these risks by implementing better security measures and educating employees on safe remote work practices.

Impact: Home Wi-Fi networks, remote work infrastructure
Remediation: Implement secure Wi-Fi protocols, conduct employee training on phishing awareness, and enforce data protection measures.
Read Original

Europol, along with various cybersecurity vendors, has dismantled a phishing-as-a-service platform that was gaining traction among cybercriminals. This platform was particularly concerning because it allowed attackers to bypass multifactor authentication (MFA) measures, which are commonly used to protect online accounts. By circumventing these defenses, the platform made it easier for malicious actors to gain unauthorized access to sensitive information. The operation highlights the ongoing challenges in cybersecurity, especially as attackers continuously find ways to exploit weaknesses in security systems. Users and organizations need to stay vigilant and ensure their security measures are up to date to defend against such sophisticated phishing attempts.

Impact: Phishing-as-a-service platform enabling bypass of multifactor authentication.
Remediation: Organizations should enhance their MFA configurations and monitor for unusual access patterns. Regular training on phishing awareness is also recommended.
Read Original

Fintech company Figure has confirmed a data breach resulting from a phishing attack that targeted one of its employees. The attackers used social engineering tactics to deceive the employee and gain access to a limited number of files. A spokesperson for Figure stated that while the breach is concerning, the extent of the data compromised is not extensive. This incident raises alarms about the effectiveness of employee training and awareness regarding phishing tactics, which continue to be a significant vulnerability for many organizations. Users and stakeholders of Figure should remain vigilant and monitor for any unusual activity related to their accounts.

Impact: Limited number of employee files
Remediation: Enhance employee training on phishing and social engineering tactics
Read Original

Odido, a telecommunications company, reported a significant data breach that exposed the personal information of approximately 6.2 million customers. The incident occurred over the weekend of February 7, when attackers accessed Odido's customer contact system. This breach raises serious concerns about data privacy and security, as it potentially includes sensitive information that could be misused by malicious actors. Customers may now face risks such as identity theft or phishing attacks, making it crucial for them to monitor their accounts and take protective measures. Odido has not disclosed specific details about how the breach happened or what steps they are taking to prevent future incidents.

Impact: Customer contact information for 6.2 million Odido customers
Remediation: N/A
Read Original

1Password has introduced a new open source benchmark called the Security Comprehension and Awareness Measure (SCAM) to address a gap in AI security. Research indicates that while some AI models can accurately identify phishing websites, when these models operate as autonomous agents with access to tools like email and password managers, they can still fall for scams. The SCAM benchmark aims to evaluate whether these AI agents can safely handle sensitive information without leaking credentials. This initiative is important as it seeks to enhance the security of AI applications, helping to prevent potential misuse by attackers. By focusing on the behavior of AI in real-world scenarios, 1Password is taking a proactive step in AI safety.

Impact: AI models, password vaults, email systems
Remediation: Implement the SCAM benchmark for testing AI agents
Read Original

The Netherlands Police have arrested a 21-year-old man from Dordrecht for allegedly selling access to a phishing tool known as JokerOTP. This tool is designed to capture one-time passwords (OTPs), which attackers can use to hijack online accounts. By exploiting this vulnerability, cybercriminals can gain unauthorized access to sensitive information and accounts, posing a significant threat to individuals and organizations alike. The arrest underscores ongoing efforts by law enforcement to crack down on cybercrime and the tools that facilitate it. Users are advised to remain vigilant and use additional security measures to protect their accounts from such phishing attempts.

Impact: JokerOTP phishing tool, online accounts
Remediation: Users should enable multi-factor authentication (MFA) wherever possible and be cautious of unsolicited messages requesting OTPs.
Read Original

In 2025, phishing attacks have evolved significantly, with new tactics gaining traction among cybercriminals. Notably, attackers are using scam QR codes to trick users into revealing personal information. Additionally, 'ClickFix' attacks have emerged, where malicious links appear to fix common issues but instead lead to phishing sites. Another trend includes lures related to ChatGPT subscriptions, enticing users with fake offers. These developments show that users need to be increasingly vigilant about suspicious links and offers, as scammers continue to adapt their methods. Companies and individuals alike must prioritize security awareness to combat these evolving threats effectively.

Impact: N/A
Remediation: Users should be cautious with QR codes and links from untrusted sources, and companies should enhance training on recognizing phishing attempts.
Read Original

A new phishing campaign linked to the Phorpiex malware is targeting users globally, delivering ransomware through emails with malicious attachments. These emails often use deceptive double extensions, such as Document.doc.lnk, to trick recipients into opening them. Once activated, the malware can spread across networks, potentially locking files and demanding ransom payments from affected organizations. This ongoing threat, active throughout 2024 and 2025, poses significant risks to businesses and individuals alike, as it can lead to the loss of sensitive data and financial resources. Users need to remain vigilant about email attachments and ensure robust security measures are in place to defend against such attacks.

Impact: N/A
Remediation: Users should avoid opening unexpected email attachments, implement email filtering solutions, and maintain updated antivirus software to help mitigate the risk.
Read Original

Volvo Group North America has reported a data breach that occurred due to a cyberattack on Conduent, a business services company that provides IT support to Volvo. The breach exposed customer data, although specific details about what information was compromised have not been disclosed. This incident raises concerns about the security of third-party vendors and the risks they pose to their clients. As companies increasingly rely on external service providers, the need for robust security measures in these partnerships becomes even more critical. Customers of Volvo Group North America should remain vigilant about potential impacts from this breach, including possible phishing attempts or identity theft.

Impact: Customer data of Volvo Group North America
Remediation: N/A
Read Original
Pride Month Phishing Targets Employees via Trusted Email Services

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

During Pride Month, attackers are sending out phishing emails that appear to come from trusted email services like SendGrid. These emails are designed to trick employees into revealing their login credentials. The phishing attempts are happening worldwide, making this a widespread issue that could compromise sensitive information across various organizations. Employees should be cautious and verify the authenticity of such emails before clicking on any links or providing personal information. This incident raises concerns about how attackers exploit timely themes to manipulate users and highlights the need for enhanced email security protocols in workplaces.

Impact: SendGrid, employee email accounts
Remediation: Employees should verify the authenticity of emails, use multi-factor authentication, and report suspicious emails to their IT department.
Read Original
Hackers Deliver Global Group Ransomware Offline via Phishing Emails

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A new strain of ransomware known as Global Group is being distributed through phishing emails. This malware is particularly concerning because it can encrypt files without requiring an internet connection, meaning that even offline systems are at risk. Organizations and individuals who fall victim to these phishing attacks could face significant data loss and operational disruptions. Cybersecurity experts warn that the ease of delivery via email makes this a widespread threat that could affect various sectors. Users are advised to be cautious with unsolicited emails and to implement robust security measures to protect against potential attacks.

Impact: N/A
Remediation: Users should be cautious with unsolicited emails and ensure they have updated antivirus software and phishing protection in place.
Read Original
Cyber Attack Hits European Commission Staff Mobile Systems

Hackread – Cybersecurity News, Data Breaches, AI and More

The European Commission has reported a cyber attack on its mobile infrastructure, which potentially exposed the names and phone numbers of its staff members. This breach raises concerns about the security of sensitive personal information within a major governmental body. Such incidents can lead to targeted phishing attacks and further exploitation of the compromised data. The European Commission has not disclosed specific details about how the attack occurred or whether it has affected other systems. The revelation serves as a reminder of the ongoing risks faced by public institutions in safeguarding their digital assets.

Impact: European Commission staff mobile systems
Remediation: N/A
Read Original

A cybercriminal group known as Bloody Wolf is targeting organizations in Uzbekistan and Russia with a spear-phishing campaign designed to deploy a remote access trojan called NetSupport RAT. This group, which has been active since at least 2023, is focusing its attacks on the manufacturing, finance, and IT sectors. Kaspersky, a cybersecurity firm, is tracking this activity under the name Stan Ghouls. The use of spear-phishing indicates that the attackers are likely customizing their messages to trick specific individuals or organizations into downloading the malicious software. This type of threat can lead to significant data breaches and operational disruptions for the affected companies, making it crucial for them to enhance their email security and user awareness training.

Impact: NetSupport RAT, manufacturing, finance, IT sectors
Remediation: Enhance email security, implement user awareness training, and monitor for unusual system activity.
Read Original

Microsoft is currently investigating an issue with Exchange Online that incorrectly identifies legitimate emails as phishing attempts, leading to their quarantine. Users of Exchange Online are facing disruptions as important emails may be blocked or filtered out. This problem raises concerns about email security and the reliability of filtering systems, as it could hinder communication and operations for businesses relying on this service. Microsoft has not yet provided a timeline for resolving the issue, leaving users uncertain about when they can expect a fix. This situation emphasizes the need for effective email security measures and accurate detection systems to prevent legitimate correspondence from being flagged incorrectly.

Impact: Exchange Online
Remediation: N/A
Read Original

Substack has confirmed that it experienced a data breach, although the company did not disclose how many users were affected. While the details surrounding the breach remain limited, Substack mentioned that only a small amount of user data was compromised. This incident raises concerns about the security of users' personal information on the platform, especially given the growing number of breaches affecting online services. Users of Substack should remain vigilant, as data breaches can lead to phishing attempts and other security risks. The lack of specific details about the breach leaves many questions unanswered, particularly regarding what types of data were compromised and how the breach occurred.

Impact: Substack user data
Remediation: N/A
Read Original
PreviousPage 5 of 12Next