CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Phishing
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Phishing

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies
Cyber SecurityNews

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

February 2, 2023
A joint cybersecurity alert warned that hackers breached multiple federal agencies via remote monitoring and management software in a widespread helpdesk-themed phishing campaign.
Read More
Hacker working on computer showing search engine ads used for malware and phishing
Cyber SecurityNews

FBI: Hackers Are Using Search Engine Ads for Phishing and Malware Distribution

January 6, 2023
The FBI warned that hackers are using search engine ads for phishing and spreading malware to unsuspecting users by impersonating legitimate businesses and services.
Read More
Senior business man using mobile phone showing whaling attacks
Cyber SecurityInsights

How High-Level Employees Can Defend Against Cybersecurity Whaling Attacks

July 15, 2022
Cyber attacks are using better research and personalization to find a way to take advantage of the senior level or C-Suite — and cybersecurity operations are falling behind in combatting these whaling attacks.
Read More
Instagram logo on a smartphone with a security padlock showing hacked Instagram accounts
Cyber SecurityNews

Attackers Publicly Demanding Ransom From Hacked Instagram Account Owners in a Brazen Phishing Campaign

February 14, 2022
Suspected Russian and Turkish attackers accuse account owners of copyright infringement, direct them to phishing pages to compromise accounts before demanding ransom from hacked Instagram account owners to restore access.
Read More
Boy and father playing games showing account takeover via phishing and social engineering
Cyber SecurityNews

EA Confirms Account Takeover Attacks Compromising High-Profile Gamers via Phishing and Social Engineering Attacks

January 20, 2022
EA introduced new security measures to prevent account takeover attacks after hackers successfully breached high-profile players’ accounts via phishing and social engineering attacks.
Read More
Close up of hacker hand using laptop with email icons showing phishing-as-a-service
Cyber SecurityInsights

Phishing-as-a-Service Brings Cybercrime to the Masses

January 20, 2022
Historically, to become a successful hacker, you had to have the knowledge and skills to create your own attacks from scratch. However, all that has changed with the proliferation of the underground market for phishing-as-a-service.
Read More
Security locks with a fish hook on computer keyboard showing phishing and cybersecurity culture
Cyber SecurityInsights

Can Your Cybersecurity Culture Stand Up to the Latest Spear Phishing Techniques?

December 8, 2021
With emails bypassing defenses, humans are left as organizations’ last line of defense against phishing attacks. But it’s unreasonable to expect each employee to be a cybersecurity expert and identify these attacks every time.
Read More
Man holding smart phone with YouTube logo on screen showing phishing of YouTube creators for cryptocurrency scams
Cyber SecurityNews

Phishing Campaign Targets YouTube Creators With Cookie Stealing Malware To Hijack Accounts And Stream Cryptocurrency Scams

November 1, 2021
A dark web forum recruited affiliates in a phishing campaign targeting YouTube creators with cookie stealing malware to hijack their accounts and stream cryptocurrency scams.
Read More
Hand holding USB device showing government employees using zero trust and multi-factor authentication
Cyber SecurityNews

Phishing-Resistant Multi-Factor Authentication Coming for US Government Employees as “Zero Trust” Architecture Rolls Out

October 27, 2021
US government employees will soon be required to use a stronger measure of multi-factor authentication to access their work accounts. Aimed at putting an end to phishing, the measure is phasing out less secure forms of authentication.
Read More
Clubhouse application icon on smartphone showing Clubhouse and Facebook users phishing and account takeover attacks
Cyber SecurityNews

“Combo File” Merging 3.8 Billion Phone Numbers from Clubhouse With Scraped Facebook Users Could Cause Surge in Phishing, Account Takeover Attacks

October 1, 2021
A new "combination file" offered on the dark web that makes connections between Clubhouse and Facebook users is a threat to create a spike in specific attack types, namely phishing and account takeover attempts.
Read More
Load More

Latest

Hands holding smartphone using Google Fi service showing T-Mobile data breach

T-Mobile Data Breach Includes Massive Compromise of Google Fi Service, Unknown Quantity of Customer Records Exposed

Data Privacy’s Tipping Point: Where We Go From Here

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

Taylor Swift on stage showing bot attack on Ticketmaster

Ticketmaster Says Bot Attack Is To Blame for the Misfortunes of Taylor Swift Fans

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results