article thumbnail

Catches of the Month: Phishing Scams for August 2022

IT Governance

Welcome to our August 2022 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over their personal data. That’s why we are suspending your account in 48h if you don’t complete the authentication process.”. Source: Bleeping Computer.

Phishing 140
article thumbnail

As of May 2024, Black Basta ransomware affiliates hacked over 500 organizations worldwide

Security Affairs

The researchers analyzed blockchain transactions, they discovered a clear link between Black Basta and the Conti Group. In December 2023, Elliptic and Corvus Insurance published a joint research that revealed the group accumulated at least $107 million in Bitcoin ransom payments since early 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers stole over $250,000 in Ethereum from Bored Ape Yacht Club

Security Affairs

The hacker conducted a phishing attack, they set up a phishing site that impersonated the official BAYC site claiming that BAYC, MAYC and OthersideMeta holders were able to claim a free NFT for a short period of time. This then granted the scam the appearance of authenticity and made it easier to dupe the NFT holders.”

Phishing 132
article thumbnail

Threat actors stole $120 M in crypto from BadgerDAO DeFi platform

Security Affairs

million in crypto funds, blockchain security firm PeckShield reported. BadgerDAO is a decentralised autonomous organisation (DAO) that allows customers to bridge user’s Bitcoin into other blockchains. “While the attack didn’t reveal specific flaws within Blockchain tech itself, it managed to exploit the older “web 2.0”

article thumbnail

16 Remote Access Security Best Practices to Implement

eSecurity Planet

The technologies for secure remote access can range from VPNs and multi-factor authentication to more advanced access and zero trust controls. Strong passwords, two-factor authentication, firewalls, encryption, and monitoring systems are just a few of the tools and procedures used to maintain security.

Access 96
article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

As a matter of fact, the most-reported crime in the 2021 Internet Crime Report report was phishing , a social engineering scam wherein the victim receives a deceptive message from someone in an attempt to get the victim to reveal personal information or account credentials or to trick them into downloading malware. Technological tactics.

article thumbnail

Discord Admins Hacked by Malicious Bookmarks

Krebs on Security

Scavuzzo said the administrator’s account was hijacked even though she had multi-factor authentication turned on. On May 27, Nahmii — a cryptocurrency technology based on the Ethereum blockchain — warned on Twitter that one of its community moderators on Discord was compromised and posting fake airdrop details.