2026-01-19Per Henrikson
The initial access was achieved via phishing, mapped to MITRE ATT&CK technique T1566: Phishing. The sophistication of the attack suggests the possible use of spearphishing attachments (T1566.001) or spearphishing links (T1566.002).
View more
2026-01-17Ian Fleming
The state of Missouri now requires internet users to verify their age before accessing adult websites, leading to an increase in demand for VPNs.
View more
2026-01-15Per Henrikson
Weak identity verification processes are leaving gig platforms, workers and consumers exposed to significant fraud and safety risks.
View more
2026-01-12Per Henrikson
Check Point researchers have detailed an investment fraud operation that uses AI-generated personas and a mobile app distributed through official app stores to construct what the company describes as a synthetic trading environment for victims.
View more
2026-01-12Ian Fleming
The dataset leaked on the dark web includes user names, full names, email addresses, phone numbers, partial physical addresses, and other contact information.
View more
2026-01-12Ian Fleming
Fraudsters may ask victims to share personal details, provide security codes, transfer money or lie to their account provider, Nationwide warned.
View more
2026-01-09Per Henrikson
A new report for the World Economic Forum’s Cybercrime Atlas, published on January 8, noted that this advancement coincided with other worrying trends, such as threat actors increasingly targeting financial services and cryptocurrency – particularly prone to KYC bypass attacks.
View more
Your experience on this site will be improved by allowing cookies
Cookie Policy