Social Media Platforms Latest Channels used to Leak Sensitive Data

Social Media Platforms Latest Channels used to Leak Sensitive Data

Threat actors are using social media accounts to expose and sell data that has been compromised. While information found on many of these platforms has traditionally been disclosed by enterprises and individuals with intent, cyber criminals are taking information acquired by means of scams and data breaches and promoting their ... Read More
Threat Actors Impersonate Brands on Social Media for Malicious Purposes

Threat Actors Impersonate Brands on Social Media for Malicious Purposes

With more than 2.95 billion people now estimated to use social media, an organization’s online presence directly relates to the satisfaction of its customers, as well as its profits. False or misleading images or comments connected with a brand on online platforms can swiftly impact the reputation or even financials ... Read More
COVID-19 Phishing Update: File Sharing Services Abused to Steal Credentials

COVID-19 Phishing Update: File Sharing Services Abused to Steal Credentials

| | COVID-19
As enterprise workforces continue to transition to remote environments, online file sharing and cloud storage tools are becoming a frequent, if not necessary means of collaboration. While abusing these types of platforms is nothing new to threat actors, the lures they use are now taking advantage of the novel coronavirus ... Read More
COVID-19 Phishing Update: Threat Actors on Twitter Want You to Pay for Your Stolen Passwords

COVID-19 Phishing Update: Threat Actors on Twitter Want You to Pay for Your Stolen Passwords

| | COVID-19
Cyber criminals are using COVID-19 to manipulate users on Twitter and steal funds through payment applications. Our latest example demonstrates how victims are being targeted with fake credential dumps ... Read More
COVID-19 Phishing Update: BEC Lures use Pandemic to Enhance Attacks

COVID-19 Phishing Update: BEC Lures use Pandemic to Enhance Attacks

| | COVID-19
Threat actors are using the novel coronavirus to add credibility in recent Business Email Compromise (BEC) attacks. Below are three examples of how they are doing it ... Read More
COVID-19 Phishing Update: Money Mule Scams Use Remote Opportunities to Entice Victims

COVID-19 Phishing Update: Money Mule Scams Use Remote Opportunities to Entice Victims

| | COVID-19
As job losses grow due to the coronavirus pandemic, cybercriminals are taking advantage of the situation to recruit individuals into money mule scams. Below are two examples that reference work-from-home opportunities ... Read More
COVID-19 Phishing Update: Scammers Impersonating Financial Institutions on Instagram

COVID-19 Phishing Update: Scammers Impersonating Financial Institutions on Instagram

| | COVID-19
Threat actors are using the novel coronavirus to impersonate accounts on social media. The example below targets members of a credit union ... Read More
COVID-19 Phishing Update: Money-Flipping Schemes Promise Coronavirus Cash

COVID-19 Phishing Update: Money-Flipping Schemes Promise Coronavirus Cash

| | COVID-19
Threat actors are using social media to engage in money-flipping scams abusing the novel coronavirus. The two examples below demonstrate how they are doing it ... Read More
COVID-19 Phishing Update: Threat Actors Abusing Utility Concerns

COVID-19 Phishing Update: Threat Actors Abusing Utility Concerns

| | COVID-19
In response to the financial difficulties resulting from COVID-19, many utilities have announced policy changes to suspend disconnects and provide relief to customers. As a result, many people are uncertain about what will happen should they be unable to pay their utility bills during the pandemic. As our latest example ... Read More
COVID-19 Phishing Update: Bad Actors Use Stimulus Payment Delays to Capture Banking Credentials

COVID-19 Phishing Update: Bad Actors Use Stimulus Payment Delays to Capture Banking Credentials

| | COVID-19
With many U.S. citizens still waiting to receive their government-mandated stimulus, we are again seeing cyber criminals shift their tactics in accordance with the news cycle. Below is one example of a lure abusing access to an undeliverable stimulus payment ... Read More
Loading...