Hackers Using Weaponized Docs In QR Code Phishing Attacks

Threat actors embed malicious QR codes in emails, documents, and public places, using them to mask destinations. 

Reduce security risk with 3 edge-securing steps | CSO Online

Risk is everywhere these days, with attacks seemly coming at our businesses from all angles — ransomware, phishing, social engineering, and an ever-growing host of vulnerabilities that can be exploited.

The biggest data breaches in 2024: 1B stolen records and rising | TechCrunch

These breaches not only affect the individuals whose data was irretrievably exposed, but also embolden the criminals who profit from their malicious cyberattacks.

From Phish to Phish Phishing: How Email Scams Got Smart – Check Point Blog

In short, malicious emails will become easier to create and more difficult to stop.

Arkansas AG lawsuit claims Temu’s shopping app is ‘dangerous malware’ – The Verge

The AG claims that Temu collects far more data than necessary to run a shopping app, including sensitive or personally identifiable information.

Why are cyberattacks increasingly targeting health care?

Why hospitals? It’s likely because of the massive databases of sensitive personal information they operate, and the importance of daily operations running smoothly.

Ransomware attacks targeting hospitals, putting lives at risk

Cyberattacks have played havoc with the bottom lines of companies all over the world. They’re also starting to kill people.

Disruptions at Many Car Dealerships Continue as CDK Hack Worsens – SecurityWeek

Dealerships use CDK products to sell cars and car parts, as well as for a wide range of other operations, and the cyberattack has caused significant disruptions for many companies. While some have resorted to pen and paper, others said they were forced to halt most of their operations. 

New York Post: Cyber experts warn of new Chrome, Microsoft money stealing malware

Often, a pretend update prompt will pop up on Google Chrome through a “compromised website” with a clipboard message to “copy the code” provided. It then instructs personal computer owners to open PowerShell — a Microsoft program for scripts — and self-paste in the malware.

Hackers are hijacking Windows Search to hit victims with malware | TechRadar

The attack starts with a phishing email pretending to be an invoice, or something similar. It carries a .ZIP archive of an HTML file, and thus successfully bypasses antivirus and email security programs that overlook compressed contents.