Hackers Using OTP bots To Bypass Two-Factor Authentication

After acquiring victim credentials, the scammer sets up a call by selecting an impersonation category (bank, email service, etc.) and manually entering the specific organization name, victim’s name, and phone number. 

Massachusetts town loses $445,000 in email scam | StateScoop

According to his statement, town employees in September received legitimate emails from the vendor to discuss issues processing payments. But, unbeknownst to the town, the cybercriminals had compromised some town employee user accounts and were monitoring email correspondence.

An evolving threat landscape: A battle between good and evil | TechRadar

As these criminal enterprises grow more professional, they also scale their operations, launching diverse and sophisticated attacks across the globe.

Why AI won’t replace human intelligence in cybersecurity | TechRadar

As hackers create new and different ways to break through security systems, AI technology that is not up to date might not know how to react or miss a threat entirely.

Russia Aims Cyber Operations at Summer Olympics

Two Russian state-aligned threat actors have been carrying out online influence operations designed to undermine the upcoming Olympic Games in Paris.

Ascension hospitals’ ransomware hack affecting patient care

Nearly two weeks since the May 8 ransomware attack that took down the computer network across the nation’s biggest Catholic health system, employees at Ascension’s Michigan hospitals told the Free Press they don’t know when all of its tech systems will be restored.

Intel issues advisories for 90 security vulnerabilities — includes critical level 10 for AI tools | Tom’s Hardware

https://www.tomshardware.com/tech-industry/cyber-security/intel-issues-advisories-for-90-security-vulnerabilities-includes-critical-level-10-for-ai-tools

Skimming — FBI

Information on different types of skimming. https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/skimming

Ransomware Defense: Top 5 Things to Do Right Now | Threatpost

https://threatpost.com/ransomware-defense-top-5-tips/167536/

How Email Attacks are Evolving in 2021 | Threatpost

https://threatpost.com/email-security-attacks-bec/163869/