Remove Accountability Remove B2B Remove Scams
article thumbnail

AI and collaboration tools: how cyberattackers are targeting SMBs in 2025

SecureList

This accounted for nearly 41% of all unique files detected, a 14-percentage point increase compared to 2024. Microsoft Office applications remained frequent targets for impersonation: Outlook and PowerPoint each accounted for 16%, Excel for nearly 12%, while Word and Teams made up 9% and 5%, respectively.

Adware 84
article thumbnail

News alert: Memcyco report reveals only 6% of brands can stop digital impersonation fraud

The Last Watchdog

provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its inaugural 2024 State of Website Impersonation Scams report. New York, NY, May 21, 2024, CyberNewsWire — Memcyco Inc., Federal Trade Commission. The full report can be found here.

Scams 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

The nonstop intensity of these attacks is vividly illustrated by the fact that malicious bot communications now account for one-third of total Internet traffic. One of the most intensive uses of criminal botnets is account takeovers. Thus, what we’re experiencing today is the blossoming of B2B and B2C commerce transacted digitally.

article thumbnail

How cybercrime is impacting SMBs in 2023

SecureList

Below is a brief description of the most popular types of threats that SMB employees encountered in January–May 2023: Exploits The biggest threat to SMBs in the first five months of 2023 were exploits , which accounted for 483,980 detections. If an employee enters their credentials, the scammers get access to their account.

article thumbnail

Using social media as a tool to share knowledge on day-to-day Cybersecurity risks

CyberSecurity Insiders

When most people think about social media and cybersecurity, they typically think about hackers taking over Instagram accounts or Facebook Messenger scammers taking private information. The Identity Theft Resource Center’s 2022 Consumer Impact Report revealed that social media account takeovers have grown by 1,000% in one year.

Media 89
article thumbnail

Data Breach: Millions of Phone Numbers, Recordings, and Call Logs Compromised in Ringostat Data Leak

Security Affairs

Identity Theft: Leaked personally identifiable information (PIIs) can be used to access accounts on other websites, leading to further information leaks and outright identity theft. Scams, Phishing, and Malware: It is common for unethical hackers and criminals on the Internet to use personal data to create trustworthy phishing emails.

article thumbnail

The story of the year: remote work

SecureList

Some employees are not strictly using their business accounts for work-related purposes. For example, 42% of workers say they are using personal email accounts for work and nearly half (49%) have admitted to increasing how often they do this. Scam and phishing. Most common shadow IT in use.

Scams 75