Nationwide Toll Road Text Scam Uses Fake Websites to Steal Money
A nationwide toll road scam uses text messages to trick victims into revealing payment card details and passwords on fake websites; Chinese smishing groups sell the sophisticated phishing kits used.
Nationwide Toll Road Text Scam Uses Fake Websites to Steal Money
A nationwide toll road scam uses text messages to trick victims into revealing payment card details and passwords on fake websites; Chinese smishing groups sell the sophisticated phishing kits used.
Progress
36% Bias Score
Russia: Fake Bank Emails Spread Malware, Steal Funds
Russian citizens are receiving fraudulent emails mimicking bank notifications, falsely claiming monthly deductions for the Ukraine conflict; clicking a link within the email installs malware, resulting in financial losses and data breaches.
Russia: Fake Bank Emails Spread Malware, Steal Funds
Russian citizens are receiving fraudulent emails mimicking bank notifications, falsely claiming monthly deductions for the Ukraine conflict; clicking a link within the email installs malware, resulting in financial losses and data breaches.
Progress
32% Bias Score
Sneaky 2FA Bypass Threatens Microsoft 365 Accounts
French security researchers exposed a new attack targeting Microsoft 365 accounts, bypassing 2FA and stealing credentials via a \$200/month phishing kit called Sneaky 2FA sold by Sneaky Log, impacting users across various platforms, highlighting the ongoing need for enhanced security measures and us...
Sneaky 2FA Bypass Threatens Microsoft 365 Accounts
French security researchers exposed a new attack targeting Microsoft 365 accounts, bypassing 2FA and stealing credentials via a \$200/month phishing kit called Sneaky 2FA sold by Sneaky Log, impacting users across various platforms, highlighting the ongoing need for enhanced security measures and us...
Progress
40% Bias Score
Hidden Malware in Emails Bypasses Security: 29,000 Victims
New malware campaigns, VIP Keylogger and 0bj3ctivityStealer, hide malicious code in email images, bypassing security; one image was viewed 29,000 times, resulting in credential and financial data theft.
Hidden Malware in Emails Bypasses Security: 29,000 Victims
New malware campaigns, VIP Keylogger and 0bj3ctivityStealer, hide malicious code in email images, bypassing security; one image was viewed 29,000 times, resulting in credential and financial data theft.
Progress
32% Bias Score
California Wildfires Fuel Surge in Phishing Scams
Following the California wildfires, Veriti discovered numerous phishing websites mimicking fire-relief organizations within 72 hours, exploiting the disaster for fraudulent financial gain and personal information theft; a separate GoFundMe scam used a victim's Ring video of their burning home to dec...
California Wildfires Fuel Surge in Phishing Scams
Following the California wildfires, Veriti discovered numerous phishing websites mimicking fire-relief organizations within 72 hours, exploiting the disaster for fraudulent financial gain and personal information theft; a separate GoFundMe scam used a victim's Ring video of their burning home to dec...
Progress
36% Bias Score
Ongoing PayPal Cyberattacks Exploit Weak Security and User Fear
PayPal users are facing ongoing cyberattacks involving phishing scams, fraudulent order confirmations, and account hacks leveraging weak passwords, resulting in credential theft and financial losses.
Ongoing PayPal Cyberattacks Exploit Weak Security and User Fear
PayPal users are facing ongoing cyberattacks involving phishing scams, fraudulent order confirmations, and account hacks leveraging weak passwords, resulting in credential theft and financial losses.
Progress
48% Bias Score
Fake CAPTCHAs Deliver Lumma Stealer Malware in Global Attack
A global malware campaign uses fake CAPTCHAs to deliver the Lumma Stealer, stealing passwords and sensitive data from various industries in countries including Argentina, Colombia, the U.S., and the Philippines, exploiting the Windows Run command to bypass browser defenses.
Fake CAPTCHAs Deliver Lumma Stealer Malware in Global Attack
A global malware campaign uses fake CAPTCHAs to deliver the Lumma Stealer, stealing passwords and sensitive data from various industries in countries including Argentina, Colombia, the U.S., and the Philippines, exploiting the Windows Run command to bypass browser defenses.
Progress
56% Bias Score
Amazon iPhone 16 Hack: Account Takeover via Social Engineering
A new hacking method targets Amazon customers, using fraudulent calls impersonating Amazon customer service to add multiple iPhone 16 orders to victims' accounts, tricking them into providing one-time codes for account takeover.
Amazon iPhone 16 Hack: Account Takeover via Social Engineering
A new hacking method targets Amazon customers, using fraudulent calls impersonating Amazon customer service to add multiple iPhone 16 orders to victims' accounts, tricking them into providing one-time codes for account takeover.
Progress
40% Bias Score
California Wildfires Fuel Surge in Phishing Scams
Following the California wildfires, cybercriminals launched phishing campaigns using newly registered domains mimicking fire relief organizations, exploiting victims' urgent need for assistance within 72 hours of the disaster's onset, resulting in financial losses and data breaches.
California Wildfires Fuel Surge in Phishing Scams
Following the California wildfires, cybercriminals launched phishing campaigns using newly registered domains mimicking fire relief organizations, exploiting victims' urgent need for assistance within 72 hours of the disaster's onset, resulting in financial losses and data breaches.
Progress
52% Bias Score
Growing Cybersecurity Threats Target Travelers in 2025
In 2025, travelers face heightened cybersecurity threats including sophisticated phishing scams, malicious websites, AI-generated fraud, and the exploitation of unsecured Wi-Fi networks, impacting booking, travel phases, and data security.
Growing Cybersecurity Threats Target Travelers in 2025
In 2025, travelers face heightened cybersecurity threats including sophisticated phishing scams, malicious websites, AI-generated fraud, and the exploitation of unsecured Wi-Fi networks, impacting booking, travel phases, and data security.
Progress
24% Bias Score
Cryptojacking Scam Targets Job Seekers
Job seekers are targeted in a new phishing scam using emails that appear to be from recruiters; clicking a link downloads a malicious application that secretly mines cryptocurrency, slowing down the victim's computer.
Cryptojacking Scam Targets Job Seekers
Job seekers are targeted in a new phishing scam using emails that appear to be from recruiters; clicking a link downloads a malicious application that secretly mines cryptocurrency, slowing down the victim's computer.
Progress
40% Bias Score
BanShee Malware Uses Stolen Apple Encryption to Target Macs
A new variant of the BanShee info-stealer malware, using stolen Apple encryption and fake GitHub repositories, targets Macs to steal browser credentials, cryptocurrency data, and other personal information, affecting potentially millions of users.
BanShee Malware Uses Stolen Apple Encryption to Target Macs
A new variant of the BanShee info-stealer malware, using stolen Apple encryption and fake GitHub repositories, targets Macs to steal browser credentials, cryptocurrency data, and other personal information, affecting potentially millions of users.
Progress
36% Bias Score