The attackers carried out a sophisticated attack on a Seattle fire chief using fake Google notifications and a call from an official Google Assistant number. The victim, convinced that the situation was genuine, handed over control of his account to the scammers.
Hackers found a photo with a seed phrase for a crypto wallet in Gmail and withdrew all funds....
Fraudsters call potential victims, promising social benefits, and offer to install a malicious application that hides under the guise of State Services or a banking service.
After launching the application, the user is asked to place the card on the phone and enter the PIN code. At this stage, the data from the card is read, and the attackers withdraw...
The scammers have scammed another shaggy guy, this time they managed to get to the holder through his partners, whose accounts in X they managed to hack.
On their behalf, the victim was sent “instructions” on how to use the new version of Zoom, as well as the update file itself.
When the mammoth launched the received software, about $1,000,000...
Victims are invited to an interview on the Willo platform, where they are asked questions about the crypto market and asked to record a video response.
During this process, an error occurs that requires updating the microphone and camera drivers and restarting the browser. Following the instructions, users install a backdoor.
The attack affects macOS, Windows and Linux operating systems.
A fired IT specialist from Moscow, who did not want to accept his dismissal, threw malware onto the computers of his former colleagues , which hacked all the files
The software demanded 27,000,000 rubles to unlock the client database. It is not specified whether this amount was paid.
Two California residents have been arrested in Los Angeles and charged with defrauding investors of more than $22 million through the Rug Pull scheme. Gabriel Hay and Gavin Mayo launched projects like Vault of Gems and Faceless with big promises, but abandoned them after receiving funds.
In addition to financial fraud, the defendants stalked a former participant in one of...
The initial step when considering data destruction is basically the same first step in data protection: Take time to understand what kind of data you’re working with. Policy around data classification is going to dictate certain aspects of how that data must be treated. Is it proprietary source code of your product? An employee’s laptop? A payroll server hard drive...
Amazon disclosed a data breach that exposed employee information after data was allegedly stolen during the May 2023 MOVEit attacks. The company said that the data was stolen from a third-party vendor.
Amazon did not disclose the number of impacted employees.
A threat actor using the handle Nam3L3ss leaked over 2.8 million records containing employee data on the hacking forum...
Fortinet researchers discovered a new phishing campaign spreading a variant of the commercial malware Remcos RAT.
Fortinet’s FortiGuard Labs recently uncovered a phishing campaign spreading a new variant of the Remcos RAT.
Remcos is a commercial remote administration tool (RAT) that is sold online to allow buyers remote control over computers. Threat actors use Remcos to steal sensitive information and...
South Korea claims Pro-Russia actors intensified cyberattacks on national sites after it decided to monitor North Korean troops in Ukraine.
South Korea’s government blames pro-Russia threat actors for an intensification of cyberattacks on national sites after it decided to monitor North Korean troops in Ukraine.
South Korea reports that over 10,000 North Korean troops are now deployed in Russia, including...