Sour Grapes: stomping on a Cambodia-based “pig butchering” scam

Credit to Author: gallagherseanm| Date: Tue, 28 Feb 2023 11:00:10 +0000
A text message leads to discovery of a vast scam infrastructure run by Chinese cyber-criminals.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: gallagherseanm| Date: Tue, 28 Feb 2023 11:00:10 +0000
A text message leads to discovery of a vast scam infrastructure run by Chinese cyber-criminals.
Read More
Credit to Author: Matt Wixey| Date: Tue, 14 Feb 2023 19:23:22 +0000
Patches for Power BI, PEAP, PostScript, Exchange, and 3D Builder
Read More
Credit to Author: gallagherseanm| Date: Mon, 13 Feb 2023 11:00:03 +0000
Scammers use counterfeit bank website, hijacked legitimate app to defraud and steal identifying information.
Read More
Credit to Author: Andrew Brandt| Date: Mon, 06 Feb 2023 18:17:20 +0000
A large-scale “QakNote” attack deploys malicious .one files as a novel infection vector
Read More
Credit to Author: Jagadeesh Chandraiah| Date: Wed, 01 Feb 2023 11:00:48 +0000
Using changing remote content, apps slide by official review process to deliver fraud through the Apple App Store and Google Play Store.
Read More
Credit to Author: Angela Gunn| Date: Wed, 11 Jan 2023 02:05:40 +0000
Adobe greets the new year with patches for 18 vulns in Reader, Acrobat, and others; sun sets on the last of Win7, 8, RT support
Read More
Credit to Author: Matt Wixey| Date: Wed, 28 Dec 2022 12:00:01 +0000
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the fourth and final part of our series, we look at how scammers scamming scammers can benefit researchers
Read More
Credit to Author: Matt Wixey| Date: Wed, 21 Dec 2022 11:00:08 +0000
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the third part of our series, we look at the curious case of twenty fake marketplaces.
Read More