cybercriminals
Curiosity-piquing Twitter DM leads to double threat
A double threat has been aimed at Twitter users as Direct Messages carrying a Facebook link and the question “what on earth could you be doing in our movie?” are …
Malware spreads fake Twitter and Facebook messages
PandaLabs detected a new Twitter spam campaign that may compromise user security. Users receive a direct message on Twitter, which contains the text “Check out Obama …
65% of organizations experience three DDoS attacks a year
Despite the increasing sophistication and severity of cyber attacks, a survey of more than 700 senior IT professionals reveals that organizations are surprisingly unarmed to …
CloudFlare users targeted by phishers
Popular content delivery network and distributed domain name server service CloudFlare has issued a warning to its users about an ongoing phishing scam: Dear cloudflare.com …
Fake AmEx alert leads to hard-to-detect malware
American Express customers are often targeted with malware-laden or phishing emails, mostly because when it comes to money and the potential loss of it, people automatically …
12 scams of Christmas
A Harris Interactive study, conducted online among over 2,300 U.S. adults, investigates the online habits and behaviors of Americans, including those who indicate that they …
“Free $100 McDonald’s gift card” scam targeting Facebook users
Facebook users are once again targeted with a rogue app / survey scam combo. The lure is a free McDonald’s $100 gift card: Users who want to get the prize are first …
Vodafone customers targeted with malware disguised as MMS
If you are a Vodafone customer, be wary of emails seemingly sent by the service notifying you of a picture message you have allegedly received (click on the screenshot to …
“USPS delivery problem” spam leads to malware
If you are a regular user of the United States Postal Service, beware of fake emails seemingly coming from the company, telling you that they have failed to deliver one of …
Image-stealing malware might lead to blackmailing attempts
Information-stealing malware targeting random computer users is usually geared towards stealing passwords and financial information by logging pressed keys and taking …
Costs of tools and activities in the Russian cybercriminal underground
A new Trend Micro research paper describes a broad offering of tools and activities that can be bought and sold on underground forum shopping sites. It examines the prices …
Can the Nuclear exploit kit dethrone Blackhole?
In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)