Articles tagged "Phishing"

Found 118 articles

Fintech company Figure has confirmed a data breach resulting from a phishing attack that targeted one of its employees. The attackers used social engineering tactics to deceive the employee and gain access to a limited number of files. A spokesperson for Figure stated that while the breach is concerning, the extent of the data compromised is not extensive. This incident raises alarms about the effectiveness of employee training and awareness regarding phishing tactics, which continue to be a significant vulnerability for many organizations. Users and stakeholders of Figure should remain vigilant and monitor for any unusual activity related to their accounts.

Impact: Limited number of employee files
Remediation: Enhance employee training on phishing and social engineering tactics
Read Original

Odido, a telecommunications company, reported a significant data breach that exposed the personal information of approximately 6.2 million customers. The incident occurred over the weekend of February 7, when attackers accessed Odido's customer contact system. This breach raises serious concerns about data privacy and security, as it potentially includes sensitive information that could be misused by malicious actors. Customers may now face risks such as identity theft or phishing attacks, making it crucial for them to monitor their accounts and take protective measures. Odido has not disclosed specific details about how the breach happened or what steps they are taking to prevent future incidents.

Impact: Customer contact information for 6.2 million Odido customers
Remediation: N/A
Read Original

1Password has introduced a new open source benchmark called the Security Comprehension and Awareness Measure (SCAM) to address a gap in AI security. Research indicates that while some AI models can accurately identify phishing websites, when these models operate as autonomous agents with access to tools like email and password managers, they can still fall for scams. The SCAM benchmark aims to evaluate whether these AI agents can safely handle sensitive information without leaking credentials. This initiative is important as it seeks to enhance the security of AI applications, helping to prevent potential misuse by attackers. By focusing on the behavior of AI in real-world scenarios, 1Password is taking a proactive step in AI safety.

Impact: AI models, password vaults, email systems
Remediation: Implement the SCAM benchmark for testing AI agents
Read Original

The Netherlands Police have arrested a 21-year-old man from Dordrecht for allegedly selling access to a phishing tool known as JokerOTP. This tool is designed to capture one-time passwords (OTPs), which attackers can use to hijack online accounts. By exploiting this vulnerability, cybercriminals can gain unauthorized access to sensitive information and accounts, posing a significant threat to individuals and organizations alike. The arrest underscores ongoing efforts by law enforcement to crack down on cybercrime and the tools that facilitate it. Users are advised to remain vigilant and use additional security measures to protect their accounts from such phishing attempts.

Impact: JokerOTP phishing tool, online accounts
Remediation: Users should enable multi-factor authentication (MFA) wherever possible and be cautious of unsolicited messages requesting OTPs.
Read Original

In 2025, phishing attacks have evolved significantly, with new tactics gaining traction among cybercriminals. Notably, attackers are using scam QR codes to trick users into revealing personal information. Additionally, 'ClickFix' attacks have emerged, where malicious links appear to fix common issues but instead lead to phishing sites. Another trend includes lures related to ChatGPT subscriptions, enticing users with fake offers. These developments show that users need to be increasingly vigilant about suspicious links and offers, as scammers continue to adapt their methods. Companies and individuals alike must prioritize security awareness to combat these evolving threats effectively.

Impact: N/A
Remediation: Users should be cautious with QR codes and links from untrusted sources, and companies should enhance training on recognizing phishing attempts.
Read Original

A new phishing campaign linked to the Phorpiex malware is targeting users globally, delivering ransomware through emails with malicious attachments. These emails often use deceptive double extensions, such as Document.doc.lnk, to trick recipients into opening them. Once activated, the malware can spread across networks, potentially locking files and demanding ransom payments from affected organizations. This ongoing threat, active throughout 2024 and 2025, poses significant risks to businesses and individuals alike, as it can lead to the loss of sensitive data and financial resources. Users need to remain vigilant about email attachments and ensure robust security measures are in place to defend against such attacks.

Impact: N/A
Remediation: Users should avoid opening unexpected email attachments, implement email filtering solutions, and maintain updated antivirus software to help mitigate the risk.
Read Original

Volvo Group North America has reported a data breach that occurred due to a cyberattack on Conduent, a business services company that provides IT support to Volvo. The breach exposed customer data, although specific details about what information was compromised have not been disclosed. This incident raises concerns about the security of third-party vendors and the risks they pose to their clients. As companies increasingly rely on external service providers, the need for robust security measures in these partnerships becomes even more critical. Customers of Volvo Group North America should remain vigilant about potential impacts from this breach, including possible phishing attempts or identity theft.

Impact: Customer data of Volvo Group North America
Remediation: N/A
Read Original
Pride Month Phishing Targets Employees via Trusted Email Services

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

During Pride Month, attackers are sending out phishing emails that appear to come from trusted email services like SendGrid. These emails are designed to trick employees into revealing their login credentials. The phishing attempts are happening worldwide, making this a widespread issue that could compromise sensitive information across various organizations. Employees should be cautious and verify the authenticity of such emails before clicking on any links or providing personal information. This incident raises concerns about how attackers exploit timely themes to manipulate users and highlights the need for enhanced email security protocols in workplaces.

Impact: SendGrid, employee email accounts
Remediation: Employees should verify the authenticity of emails, use multi-factor authentication, and report suspicious emails to their IT department.
Read Original
Hackers Deliver Global Group Ransomware Offline via Phishing Emails

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A new strain of ransomware known as Global Group is being distributed through phishing emails. This malware is particularly concerning because it can encrypt files without requiring an internet connection, meaning that even offline systems are at risk. Organizations and individuals who fall victim to these phishing attacks could face significant data loss and operational disruptions. Cybersecurity experts warn that the ease of delivery via email makes this a widespread threat that could affect various sectors. Users are advised to be cautious with unsolicited emails and to implement robust security measures to protect against potential attacks.

Impact: N/A
Remediation: Users should be cautious with unsolicited emails and ensure they have updated antivirus software and phishing protection in place.
Read Original
Cyber Attack Hits European Commission Staff Mobile Systems

Hackread – Cybersecurity News, Data Breaches, AI and More

The European Commission has reported a cyber attack on its mobile infrastructure, which potentially exposed the names and phone numbers of its staff members. This breach raises concerns about the security of sensitive personal information within a major governmental body. Such incidents can lead to targeted phishing attacks and further exploitation of the compromised data. The European Commission has not disclosed specific details about how the attack occurred or whether it has affected other systems. The revelation serves as a reminder of the ongoing risks faced by public institutions in safeguarding their digital assets.

Impact: European Commission staff mobile systems
Remediation: N/A
Read Original

A cybercriminal group known as Bloody Wolf is targeting organizations in Uzbekistan and Russia with a spear-phishing campaign designed to deploy a remote access trojan called NetSupport RAT. This group, which has been active since at least 2023, is focusing its attacks on the manufacturing, finance, and IT sectors. Kaspersky, a cybersecurity firm, is tracking this activity under the name Stan Ghouls. The use of spear-phishing indicates that the attackers are likely customizing their messages to trick specific individuals or organizations into downloading the malicious software. This type of threat can lead to significant data breaches and operational disruptions for the affected companies, making it crucial for them to enhance their email security and user awareness training.

Impact: NetSupport RAT, manufacturing, finance, IT sectors
Remediation: Enhance email security, implement user awareness training, and monitor for unusual system activity.
Read Original

Microsoft is currently investigating an issue with Exchange Online that incorrectly identifies legitimate emails as phishing attempts, leading to their quarantine. Users of Exchange Online are facing disruptions as important emails may be blocked or filtered out. This problem raises concerns about email security and the reliability of filtering systems, as it could hinder communication and operations for businesses relying on this service. Microsoft has not yet provided a timeline for resolving the issue, leaving users uncertain about when they can expect a fix. This situation emphasizes the need for effective email security measures and accurate detection systems to prevent legitimate correspondence from being flagged incorrectly.

Impact: Exchange Online
Remediation: N/A
Read Original

Substack has confirmed that it experienced a data breach, although the company did not disclose how many users were affected. While the details surrounding the breach remain limited, Substack mentioned that only a small amount of user data was compromised. This incident raises concerns about the security of users' personal information on the platform, especially given the growing number of breaches affecting online services. Users of Substack should remain vigilant, as data breaches can lead to phishing attempts and other security risks. The lack of specific details about the breach leaves many questions unanswered, particularly regarding what types of data were compromised and how the breach occurred.

Impact: Substack user data
Remediation: N/A
Read Original
Flickr Notifies Users of Data Breach After External Partner Security Flaw

Hackread – Cybersecurity News, Data Breaches, AI and More

Flickr has informed its users about a data breach linked to a security flaw in a third-party email vendor. This issue may have led to the exposure of user information, including usernames, email addresses, IP addresses, and activity logs. Although Flickr did not specify how many users were affected, the incident raises concerns about the security of personal data held by external partners. Users should be vigilant about potential phishing attempts or unauthorized access to their accounts, as this type of leaked information can often be exploited for malicious purposes. The situation serves as a reminder for companies to carefully vet their third-party vendors to protect user data.

Impact: Flickr users
Remediation: Users are advised to monitor their accounts for suspicious activity and change their passwords as a precaution.
Read Original

German security officials are alerting the public about a series of phishing attempts targeting high-profile individuals, including military officials, diplomats, and investigative journalists, primarily using the messaging app Signal. Authorities believe these attacks are likely orchestrated by a state-backed hacking group, although they acknowledge that non-state actors could exploit similar tactics. The attackers are reaching out directly to their targets within the app, which raises concerns about the security of private communications among key figures. This situation is significant as it not only threatens the privacy of those affected but also poses risks to national security and the integrity of journalistic work. The potential for similar attacks by financially motivated cybercriminals adds another layer of urgency to the warnings.

Impact: Signal messaging app users, specifically military officials, diplomats, and journalists in Germany and Europe.
Remediation: Users should be cautious of unsolicited messages and verify the identity of contacts before engaging. Regularly updating app security settings and educating users about phishing tactics is recommended.
Read Original
Page 1 of 8Next