Sour Grapes: stomping on a Cambodia-based “pig butchering” scam
Credit to Author: gallagherseanm| Date: Tue, 28 Feb 2023 11:00:10 +0000
A text message leads to discovery of a vast scam infrastructure run by Chinese cyber-criminals.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: gallagherseanm| Date: Tue, 28 Feb 2023 11:00:10 +0000
A text message leads to discovery of a vast scam infrastructure run by Chinese cyber-criminals.
Read MoreCredit to Author: Matt Wixey| Date: Tue, 14 Feb 2023 19:23:22 +0000
Patches for Power BI, PEAP, PostScript, Exchange, and 3D Builder
Read MoreCredit to Author: gallagherseanm| Date: Mon, 13 Feb 2023 11:00:03 +0000
Scammers use counterfeit bank website, hijacked legitimate app to defraud and steal identifying information.
Read MoreCredit to Author: Andrew Brandt| Date: Mon, 06 Feb 2023 18:17:20 +0000
A large-scale “QakNote” attack deploys malicious .one files as a novel infection vector
Read MoreCredit to Author: Jagadeesh Chandraiah| Date: Wed, 01 Feb 2023 11:00:48 +0000
Using changing remote content, apps slide by official review process to deliver fraud through the Apple App Store and Google Play Store.
Read MoreCredit to Author: Angela Gunn| Date: Wed, 11 Jan 2023 02:05:40 +0000
Adobe greets the new year with patches for 18 vulns in Reader, Acrobat, and others; sun sets on the last of Win7, 8, RT support
Read MoreCredit to Author: Matt Wixey| Date: Wed, 28 Dec 2022 12:00:01 +0000
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the fourth and final part of our series, we look at how scammers scamming scammers can benefit researchers
Read MoreCredit to Author: Matt Wixey| Date: Wed, 21 Dec 2022 11:00:08 +0000
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the third part of our series, we look at the curious case of twenty fake marketplaces.
Read More