article thumbnail

Deceptive Google Meet Invites Lures Users Into Malware Scams

eSecurity Planet

These malware scams lure individuals with fake conference invitations designed to mimic legitimate meeting requests and exploit users’ trust. These groups are considered sub-teams of larger cryptocurrency scam networks, highlighting the organized and systematic nature of these phishing attacks.

Scams 124
article thumbnail

“Can you try a game I made?” Fake game sites lead to information stealers

Malwarebytes

The Hexon stealer is relatively new, but we know it is based on Stealit Stealer code and capable of exfiltrating Discord tokens, 2FA backup codes, browser cookies, autofill data, saved passwords, credit card details, and even cryptocurrency wallet information. But the end goal to this scam, and most others, is monetary gain.

Scams 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2023 Predictions for Storage and Backup Ransomware

CyberSecurity Insiders

Many of these attacks took advantage of known vulnerabilities and security misconfigurations in storage and backup systems. And backup and storage systems are rife with unpatched CVEs. Slow Gains on Storage and Backup Security. Make it extremely difficult to tamper with backups and exfiltrate data.

Backups 136
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Deepfake scams will escalate, with threat actors using AI to create convincing impersonations of executives, risking personal and corporate brands. With adversaries destroying backups to increase extortion payouts, recovery will grow harder and slower, emphasizing the need for stronger security controls and architecture.

article thumbnail

Beware Ukraine-themed fundraising scams

Malwarebytes

A flurry of bogus domains and scam techniques are spreading their wings. Reports indicate a big run on phishing and scams. Where scams sometimes diverge from real fundraising sites is in requesting payment via cryptocurrency. There are things you can do to lessen the risk from awful scams such as the above.

Scams 131
article thumbnail

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

IT Security Guru

They must recognise the scam patterns that may threaten a business’s data and take a unified approach to prevent data loss and mitigate cyber threats. Tech Support Scam While they may seem like a relic of the past, tech support scams continue to thrive and deceive numerous victims.

Scams 138
article thumbnail

Beware the Cyber Ghouls: Spooky Threats Lurking in Digital Shadows

SecureWorld News

Phishing phantoms: masters of disguise Phishing scams have become more sophisticated. The crucifix : Regular backups, robust firewalls, and anti-malware software can drive away these bloodsuckers, keeping your system safe from sudden data "drain." Spooky fact : Sophos says the average ransom in 2024 is $2.73

IoT 119