Remove CSO Remove Phishing Remove Scams
article thumbnail

Security Roundup April 2025

BH Consulting

Its top three cybercrimes, based on reports from victims, were: phishing/spoofing, extortion and personal data breaches. CSO Online marked the progress as 66 per cent done. Diving into e-commerce scams MORE How threat actors used Zooms remote control feature for a crypto scam. Losses in 2024 exceeded an eye-watering $6.5

article thumbnail

Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams

CSO Magazine

Security researchers have used the GPT-3 natural language generation model and the ChatGPT chatbot based on it to show how such deep learning models can be used to make social engineering attacks such as phishing or business email compromise scams harder to detect and easier to pull off.

Scams 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A week in security (Nov 1 – Nov 7)

Malwarebytes

Google patches zero-day vulnerability , and others, in Android Zuckerberg’s Metaverse , and the possible privacy and security concerns This Steam phish baits you with a free Discord Nitro BlackMatter ransomware group announces shutdown. New “Frankenstein” phishing kits are becoming increasingly popular.

CSO 120
article thumbnail

Cybercriminals target SVB customers with BEC and cryptocurrency scams

CSO Magazine

Cybercriminals have started taking advantage of Silicon Valley Bank’s (SVB) downfall to carrying out scams that can steal money, and bank account information, or infect customers’ systems with malware. This means these customers will receive notifications including the new bank account numbers from their new bank.

Scams 97
article thumbnail

Business email compromise scams take new dimension with multi-stage attacks

CSO Magazine

The attack , which Microsoft researchers call multi-stage adversary-in-the-middle (AiTM) phishing, started with a compromise at a trusted vendor and targeted organizations from the banking and financial services sectors. To read this article in full, please click here

Scams 123
article thumbnail

8 pitfalls that undermine security program success

CSO Magazine

And a bitcoin scam on Twitter started with spear phishing attacks on Twitter employees. Hackers used a compromised password to access the company network via a virtual private network in the May 2021 Colonial Pipeline attack. A widely known vulnerability that hadn’t yet been patched was the entry point for the 2017 Equifax attack.

Scams 138
article thumbnail

Foreign states already using ChatGPT maliciously, UK IT leaders believe

CSO Magazine

The findings follow recent research which showed how attackers can use ChatGPT to significantly enhance phishing and business email compromise (BEC) scams. In fact, almost half (48%) predicted that a successful cyberattack will be credited to the technology within the next 12 months. To read this article in full, please click here

Scams 93