FBI Warns of Growing Mobile Banking App Threats

FBI Warns of Growing Mobile Banking App Threats

|
The Federal Bureau of Investigation (FBI) published a public service announcement Wednesday warning the public of anticipated cyber attacks that exploit increased usage of mobile banking apps. The advisory comes at a time when a vast majority of Americans are working from home due to social distancing, and as a ... Read More
Data Leakage on Social Media: Credit Card Info, Confidential Docs

Data Leakage on Social Media: Credit Card Info, Confidential Docs

When the term data leak comes to mind, most enterprises think of the dark web. Although compromised information can damage an organization when distributed through gated and anonymous platforms, we are seeing social channels being used to allow for a more rapid and potentially destructive outcome. These platforms have an ... Read More
Social Media Platforms Latest Channels used to Leak Sensitive Data

Social Media Platforms Latest Channels used to Leak Sensitive Data

Threat actors are using social media accounts to expose and sell data that has been compromised. While information found on many of these platforms has traditionally been disclosed by enterprises and individuals with intent, cyber criminals are taking information acquired by means of scams and data breaches and promoting their ... Read More
Threat Actors Impersonate Brands on Social Media for Malicious Purposes

Threat Actors Impersonate Brands on Social Media for Malicious Purposes

With more than 2.95 billion people now estimated to use social media, an organization’s online presence directly relates to the satisfaction of its customers, as well as its profits. False or misleading images or comments connected with a brand on online platforms can swiftly impact the reputation or even financials ... Read More
COVID-19 Phishing Update: File Sharing Services Abused to Steal Credentials

COVID-19 Phishing Update: File Sharing Services Abused to Steal Credentials

| | COVID-19
As enterprise workforces continue to transition to remote environments, online file sharing and cloud storage tools are becoming a frequent, if not necessary means of collaboration. While abusing these types of platforms is nothing new to threat actors, the lures they use are now taking advantage of the novel coronavirus ... Read More
COVID-19 Phishing Update: Threat Actors on Twitter Want You to Pay for Your Stolen Passwords

COVID-19 Phishing Update: Threat Actors on Twitter Want You to Pay for Your Stolen Passwords

| | COVID-19
Cyber criminals are using COVID-19 to manipulate users on Twitter and steal funds through payment applications. Our latest example demonstrates how victims are being targeted with fake credential dumps ... Read More
COVID-19 Phishing Update: BEC Lures use Pandemic to Enhance Attacks

COVID-19 Phishing Update: BEC Lures use Pandemic to Enhance Attacks

| | COVID-19
Threat actors are using the novel coronavirus to add credibility in recent Business Email Compromise (BEC) attacks. Below are three examples of how they are doing it ... Read More
COVID-19 Phishing Update: Money Mule Scams Use Remote Opportunities to Entice Victims

COVID-19 Phishing Update: Money Mule Scams Use Remote Opportunities to Entice Victims

| | COVID-19
As job losses grow due to the coronavirus pandemic, cybercriminals are taking advantage of the situation to recruit individuals into money mule scams. Below are two examples that reference work-from-home opportunities ... Read More
COVID-19 Phishing Update: Scammers Impersonating Financial Institutions on Instagram

COVID-19 Phishing Update: Scammers Impersonating Financial Institutions on Instagram

| | COVID-19
Threat actors are using the novel coronavirus to impersonate accounts on social media. The example below targets members of a credit union ... Read More
COVID-19 Phishing Update: Money-Flipping Schemes Promise Coronavirus Cash

COVID-19 Phishing Update: Money-Flipping Schemes Promise Coronavirus Cash

| | COVID-19
Threat actors are using social media to engage in money-flipping scams abusing the novel coronavirus. The two examples below demonstrate how they are doing it ... Read More