Articles tagged "Phishing"

Found 118 articles

The Clop ransomware group has claimed responsibility for a significant data breach at the University of Phoenix, affecting approximately 3.5 million people. The breach reportedly exposed sensitive information, although the exact nature of the data compromised has not been detailed. This incident raises serious concerns about the security measures in place at educational institutions and the potential for misuse of the stolen data. Individuals affected by the breach may face risks such as identity theft or phishing attempts. As the investigation continues, it underscores the need for stronger cybersecurity protocols to protect personal information in higher education settings.

Impact: University of Phoenix data, personal information of 3.5 million individuals
Remediation: N/A
Read Original
Top Ransomware Trends of 2025

Infosecurity Magazine

Actively Exploited

In 2025, ransomware attacks have shown a significant increase, with various industries facing heightened risks. The report outlines key statistics that reveal the evolving tactics used by attackers, including targeted assaults on critical infrastructure and healthcare systems. Companies are increasingly vulnerable as ransomware groups adapt, often deploying double extortion techniques that not only encrypt data but also threaten to leak sensitive information if ransoms are not paid. This trend poses serious implications for businesses, as the financial and reputational damage from such attacks can be substantial. Organizations are urged to bolster their cybersecurity measures and educate employees about phishing and other attack vectors to mitigate these risks.

Impact: Critical infrastructure, healthcare systems, various industries
Remediation: Companies should enhance cybersecurity measures, conduct employee training on phishing, and implement regular data backups.
Read Original

Nissan has confirmed that the personal information of approximately 21,000 customers was compromised due to a data breach involving Red Hat's GitLab instances. Hackers gained unauthorized access to sensitive data, raising concerns about the security of customer information in the automotive industry. This incident emphasizes the ripple effects that breaches at major technology providers can have on their clients. The stolen data could potentially be used for identity theft or phishing attacks, putting affected customers at risk. Companies like Nissan must prioritize robust cybersecurity measures to protect customer data and maintain trust.

Impact: Personal information of 21,000 Nissan customers
Remediation: N/A
Read Original

Federal authorities have seized a password database linked to a large-scale bank account takeover scheme that targeted $28 million in funds. The attackers used phishing techniques to compromise bank accounts, putting numerous individuals and financial institutions at risk. This operation illustrates the ongoing threat posed by cybercriminals who exploit user credentials to access sensitive financial information. The seizure of the password database is a significant step in disrupting these criminal activities and protecting potential victims from further financial loss. As phishing remains a prevalent tactic, users must remain vigilant and practice safe online behaviors to safeguard their accounts.

Impact: Compromised bank accounts, phishing victims
Remediation: Users should enable two-factor authentication, regularly update passwords, and be cautious of unsolicited communications requesting personal information.
Read Original

Nissan has reported that a data breach at Red Hat has compromised the personal information of thousands of its customers. The breach, which occurred in September, has raised concerns about the security of customer data, as it highlights vulnerabilities in third-party services that companies rely on. Nissan has not specified the exact nature of the compromised information, but the incident emphasizes the risks associated with data sharing among businesses. Customers are urged to monitor their accounts for any suspicious activity and to remain vigilant about potential phishing attempts that could arise from the breach. This incident serves as a reminder for companies to assess their security measures and the safeguards in place for customer data.

Impact: Customer personal information
Remediation: Customers should monitor their accounts for suspicious activity and remain vigilant against phishing attempts.
Read Original
Actively Exploited

Fortra has identified a highly active business email compromise (BEC) group known as 'Scripted Sparrow', which is operating across three continents and at least five countries. This group is responsible for sending millions of fraudulent emails each month, targeting businesses and individuals to steal sensitive information and money. The scale of their operations poses a significant risk to organizations globally, as these types of scams can lead to substantial financial losses. Companies need to remain vigilant and implement strong email security measures to protect against this growing threat. Awareness and training for employees on recognizing phishing attempts are also crucial in combating such schemes.

Impact: Businesses and individuals targeted by BEC scams.
Remediation: Implement strong email security measures, employee training on phishing recognition.
Read Original

A recent report from Proofpoint reveals a rise in phishing attacks that take advantage of Microsoft's OAuth device code flow. These campaigns target Microsoft 365 users, tricking them into providing access to their accounts through fake sign-in prompts. The attacks exploit the trust users place in the OAuth process, which is designed to facilitate secure authentication. As a result, individuals and organizations using Microsoft 365 could be at risk of unauthorized access to sensitive information. This surge in phishing attempts underscores the need for heightened awareness and vigilance among users to avoid falling victim to these scams.

Impact: Microsoft 365
Remediation: Users should be cautious of unsolicited sign-in requests and verify the legitimacy of prompts before entering credentials. Implementing multi-factor authentication can also help mitigate risks.
Read Original

In October 2025, Kaspersky reported a new wave of phishing attacks linked to a group known as Operation ForumTroll, specifically targeting Russian scholars. These attackers are using fake emails that appear to come from a legitimate eLibrary service to lure victims into providing sensitive information. This shift from targeting organizations in the spring to focusing on individuals in the fall raises concerns about the attackers' evolving strategies. The origins of the threat actor remain unclear, but the targeted approach suggests a calculated effort to exploit the academic community. Such incidents can lead to significant data breaches and have serious implications for both personal and institutional security.

Impact: Russian scholars, academic institutions
Remediation: Users should verify email sources before clicking links or providing personal information and consider using security training to recognize phishing attempts.
Read Original
Hackers Claim Stealing 94GB of Pornhub Premium User Watch Histories

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A hacking group known as ShinyHunters has reportedly stolen 94GB of data from former Pornhub Premium users, which includes their watch histories. This breach is part of an extortion campaign aimed at these users, raising significant privacy concerns. The attackers utilized a smishing attack, where they sent phishing messages via text to lure victims into revealing personal information. While the specifics of the breach are still being investigated, conflicting reports have emerged about the extent and security of the data involved. This incident underscores the ongoing risks associated with online platforms, particularly regarding user data security and the potential for exploitation by cybercriminals.

Impact: Pornhub Premium user watch histories
Remediation: Users should monitor their accounts for suspicious activity and consider changing passwords. Enabling two-factor authentication can also help enhance security.
Read Original

SoundCloud has confirmed that hackers accessed the personal information of approximately 20% of its user base. The breach raises concerns about the security of user data on the platform, as it affects a significant number of accounts. This incident could lead to potential misuse of the compromised information, such as phishing attacks or identity theft. Users are advised to change their passwords and monitor their accounts for any suspicious activity. SoundCloud's response to the breach will be crucial in restoring user trust and ensuring the security of their systems moving forward.

Impact: SoundCloud user accounts
Remediation: Users should change their passwords and monitor accounts for suspicious activity.
Read Original

Phishing remains a common tactic for cyber attackers, making user training essential for defense. Researchers at the University of Bari conducted studies with 480 participants to evaluate the effectiveness of using AI-generated content for phishing awareness training. The results indicated that training using large language models (LLMs) improved participants' ability to identify suspicious emails. This suggests that integrating AI into training programs could enhance users' resilience against phishing attacks, which is crucial as these tactics continue to evolve. By equipping users with better training, organizations can potentially reduce their vulnerability to these types of cyber threats.

Impact: N/A
Remediation: N/A
Read Original

A recent phishing campaign has been discovered that spreads the Phantom information-stealing malware through ISO file attachments. Attackers are targeting users by disguising these malicious files as legitimate content, tricking them into opening the files and executing the malware. Once installed, Phantom can collect sensitive information, including login credentials and personal data. This campaign poses a significant risk to individuals and organizations, as it can lead to data breaches and identity theft. Users should be cautious when receiving unsolicited emails with attachments, especially ISO files, and ensure their security software is up to date.

Impact: Users of email services and systems that can open ISO files, particularly those who engage with suspicious emails.
Remediation: Users should avoid opening ISO files from unknown sources, ensure email security filters are enabled, and keep antivirus software updated.
Read Original

A new email scam is exploiting PayPal's subscription feature to send deceptive purchase notifications. These emails appear legitimate as they come from PayPal but contain links directing users to fraudulent sites. The scam takes advantage of the way PayPal's subscription system generates email notifications, making it challenging for recipients to discern the authenticity of the messages. Users who fall for these scams could inadvertently share personal information or financial details with malicious actors. It's crucial for PayPal users to be cautious when receiving unexpected purchase notifications and to verify any claims before taking action.

Impact: PayPal users
Remediation: Users should verify email sender addresses, avoid clicking on links in unexpected emails, and report suspicious messages to PayPal.
Read Original

A significant security oversight was uncovered when researchers found an unsecured 16TB MongoDB database that exposed approximately 4.3 billion professional records. This database primarily contained LinkedIn-style data, which could be exploited for large-scale AI-driven social engineering attacks. The discovery was made by Bob Diachenko and nexos.ai on November 23, 2025, and the database was secured only after the researchers alerted its owner. This incident underscores the risks associated with unsecured databases, as the exposed data could facilitate identity theft and phishing schemes targeting professionals. Organizations need to ensure better security measures for their data to prevent such breaches in the future.

Impact: Unsecured MongoDB database, professional records, LinkedIn-style data
Remediation: Database secured after researcher notification; organizations should implement strict access controls and regular security audits.
Read Original
UK’s ICO Fine LastPass £1.2 Million Over 2022 Security Breach

Hackread – Cybersecurity News, Data Breaches, AI, and More

The UK's Information Commissioner's Office (ICO) has imposed a £1.2 million fine on LastPass following a significant data breach in 2022 that compromised the personal information of 1.6 million users. The breach was traced back to a vulnerability in an employee's personal computer, which allowed attackers to access sensitive data. This incident raises serious concerns about the security practices of password management services, especially considering the potential for misuse of the exposed information. Users of LastPass are now at increased risk of phishing attacks and identity theft. The fine serves as a reminder for companies to enhance their cybersecurity measures and protect user data more effectively.

Impact: LastPass user accounts and associated personal data
Remediation: Companies should conduct thorough security audits and ensure employees follow strict cybersecurity protocols, particularly when using personal devices for work.
Read Original
PreviousPage 6 of 8Next