Beware Of Malicious PDF Files That Mimic As Microsoft 2FA Security Update

Phishing attacks are evolving to use QR codes to trick users into entering their credentials on malicious websites, which can be designed to look like legitimate login pages and may even prefill the username field to increase believability. 

Crypto Ponzi Scheme Busted: US Court Orders Hedge Fund Owner To Pay $84 Million

The court order details how, instead of generating returns through investments, Ikkurty used funds from new investors to pay out promised returns to earlier participants. This practice, known as a Ponzi scheme, is inherently unsustainable and ultimately leads to the collapse of the scheme when new investors dry up.

The FIA has been hacked after workers fell for a phishing attack | TechRadar

In a short press release, the FIA confirmed recent phishing attacks resulted in “unauthorized access to personal data contained in two email accounts belonging to the FIA.”

Crypto scammers stole nearly $60m from 20 victims in H1 2024, data shows

Victims are often lured through phishing comments from impersonated accounts on X. Once on the phishing site, they are tricked into making seemingly legitimate transactions from their non-custodial wallets, resulting in unauthorized fund access.

RockYou2024: 10 billion passwords leaked in the largest compilation of all time | Cybernews

“In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world. Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks,” researchers said.

Types of Cyber Crime: A Guide to Prevention & Impact

From individual cybercriminals to organized groups, cyber crime has become a social epidemic that knows no borders. Cyber criminals use psychological manipulation, phishing, and malware to exploit individuals and organizations, causing financial losses and disrupting business operations.

Reduce security risk with 3 edge-securing steps | CSO Online

Risk is everywhere these days, with attacks seemly coming at our businesses from all angles — ransomware, phishing, social engineering, and an ever-growing host of vulnerabilities that can be exploited.

The biggest data breaches in 2024: 1B stolen records and rising | TechCrunch

These breaches not only affect the individuals whose data was irretrievably exposed, but also embolden the criminals who profit from their malicious cyberattacks.

Criminals are using surveillance cameras to stake out homes.

Multiple reports from neighborhoods across Southern California have come in of folks finding cheap cameras with small battery packs lovingly packaged in camouflage tape and pointed at their homes.

From Phish to Phish Phishing: How Email Scams Got Smart – Check Point Blog

In short, malicious emails will become easier to create and more difficult to stop.