Cybercriminals taking advantage of the Ukraine crisis to create charity donation scams

In this video for Help Net Security, Charles Brook, Threat Intelligence Researcher at Tessian, talks about how cybercriminals have taken advantage of the crisis in Ukraine to create charity donation scams. In response to the crisis, people around the w… Continue reading Cybercriminals taking advantage of the Ukraine crisis to create charity donation scams

NFT Security Risks: Old Scams and New Tricks

The non-fungible token (NFT) boom has also led to some serious security incidents. For example, the number of suspicious-looking domain registrations with names of NFT stores increased nearly 300% in March 2021.   To participate in an NFT marketplace, you must have an active cryptocurrency wallet. This exposes NFT holders to new risks as attackers can […]

The post NFT Security Risks: Old Scams and New Tricks appeared first on Security Intelligence.

Continue reading NFT Security Risks: Old Scams and New Tricks

Hackers Using Fake Police Data Requests against Tech Companies

Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data.

Virtually all major technology companies serving large numbers of users online have departments that routinely review and process such requests, which are typically granted as long as the proper documents are provided and the request appears to come from an email address connected to an actual police department domain name.

But in certain circumstances ­– such as a case involving imminent harm or death –­ an investigating authority may make what’s known as an Emergency Data Request (EDR), which largely bypasses any official review and does not require the requestor to supply any court-approved documents…

Continue reading Hackers Using Fake Police Data Requests against Tech Companies

Utilizing biological algorithms to detect cyber attacks

Phishing, a longstanding cyberattack technique through which attackers impersonate others to gain access to confidential information, has become immensely popular as of late, hitting an all-time high in December 2021, with attacks tripling since the pr… Continue reading Utilizing biological algorithms to detect cyber attacks

Beware of old and new tax-themed scams and schemes

April 18 marks the end of the 2022 US tax season and those individuals who are yet to file their taxes should get a move on. But they should not throw caution to the wind, as scammers, fraudsters, phishers and malware peddlers are working hard to explo… Continue reading Beware of old and new tax-themed scams and schemes

Cybercriminals focusing on crypto donations to Ukraine to trick victims

As the war in Ukraine unfolded, one way of helping was to donate cryptocurrency which resulted in over $50 million in crypto donations. Cybercriminals were quick to move and take advantage of this lucrative situation and inattentive victims. The Cyren … Continue reading Cybercriminals focusing on crypto donations to Ukraine to trick victims

War in Ukraine: What type of cyber attacks can we expect next?

The cyber activities related to the ongoing war in Ukraine have run the gamut from wiper malware hitting organizations and the border control in Ukraine, DDoS attacks aimed at government and media websites, and cyber disruption of satellite-based inter… Continue reading War in Ukraine: What type of cyber attacks can we expect next?