News, Tips, Security Lab

Financial Assistance Department Email Scam to call (855)-XXX-XXXX

Financial Assistance Department Email Scam to call (855)-XXX-XXXX

Email is one of the oldest ways to exchange information over the Internet. So, email scams are the most common…

BreachForums is down. Things got worse?

Recently, one of BreachForums administrators nicknamed PomPomPurin was arrested by the FBI. That event took place on March 17, 2023,…

5 Tips to Improve Your Privacy on the Web

Nowadays, online privacy is a crucial concern that we should all be aware of, especially when it comes to using…

GPT-4 Tricked a Person into Solving a CAPTCHA for Them by Pretending to Be Visually Impaired

Prior to the launch of GPT-4 earlier this week, the researchers ran a lot of tests, such as whether the…

New Microsoft SmartScreen Bypass Technique Causes Concerns

Microsoft SmartScreen proved to be an effective way of approving the legitimacy of the application – by checking one’s certificate.…

The FBI Said That the Damage from Cyberattacks in 2022 Exceeded $10 Billion

The FBI Said That the Damage from Cyberattacks in 2022 Exceeded $10 Billion

The FBI’s Internet Fraud Complaint Center (IC3) has released its annual 2022 Internet Crime and Cyber Attack Damage Report. During the year, the FBI reportedly received more than 800,000 cybercrime-related…

North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

Mandiant experts noticed that North Korean hackers have focused their attention and attacks on information security specialists. Attackers try to infect researchers with malware in the hope of infiltrating the…

Incoming Silicon Valley Bank Related Scams

Incoming Silicon Valley Bank Related Scams

Mind-bending globe-scale events always attract a lot of attention. Newsmakers, politicians and simple rubbernecks pay a lot of attention to such a loud events, and a recent Silicon Valley Bank…

Mobile Malware Threat Landscape — 2022 Summary

Mobile Malware Threat Landscape — 2022 Summary

Today, a smartphone is much more than just a way to reach someone on the phone. Our smartphones contain valuable information, such as private photos, logins, and passwords for online…

Emotet Has Resumed Activity after a Three-Month Break

Emotet Has Resumed Activity after a Three-Month Break

Experts noticed that this week Emotet resumed its activity and after a three-month “rest” began to send malicious spam again. So far, information security specialists have not found any additional…

Acronis Breached, Internal Data Leaked

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery services for hacked companies was breached earlier this month. The breach became public on March 9, 2023, when a hacker…

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft Office product, namely Microsoft Word, has emerged online. This issue has been rated 9.8 out of 10 on the CVSS…

ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users

ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users

Today, phishing sites are commonplace. But unfortunately, this seemingly old, deceptive tactic, which everyone seemed to have figured out long ago, still brings enormous profits to scammers today. The problem…

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded in web pages, hackers can force Bing’s AI chatbot to ask for personal information from users, turning the bot into…

Fake BSOD Scams Target Users Visiting Fake Adult Sites

Fake BSOD Scams Target Users Visiting Fake Adult Sites

The blue screen of death is probably the most unpleasant thing Windows users may ever see. In most cases, it is an alarming sign that something is wrong with your…

New Acer Breach Exposes 160GB of Data

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach – for certain reasons, it may be for their good. However, it is not particularly easy to hide an elephant…

СhatGPT Became a Source of Phishing

СhatGPT Became a Source of Phishing

As the digital world continues to evolve, so do the tactics of online scammers who seem to have an unending well of creativity when it comes to their fraudulent schemes.…