Spam Blog 2025- 2026  2025  2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

27.12.25 RTO Scam Wave Continues: A Surge in Browser-Based e-Challan Phishing and Shared Fraud Infrastructure CRIL Uncovers a New Wave of Browser-Based e-Challan Phishing Powered by Shared Fraud Infrastructure. Spam blog

Cyble

27.12.25 A brush with online fraud: What are brushing scams and how do I stay safe? Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow. Spam blog

Eset

1.11.25 Cloud Abuse at Scale FortiGuard Labs analyzes TruffleNet, a large-scale campaign abusing AWS SES with stolen credentials and linked to Business Email Compromise (BEC). Spam blog FORTINET
1.11.25 Fraud prevention: How to help older family members avoid scams Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically Spam blog Eset
30.8.25 Cybersecurity Stop of the Month: BEC Attacks Targeting Government Agencies  Email-based threats against public sector organizations are rising in both scale and complexity. One of the most popular attacks that government finance and procurement teams are targeted with is business email compromise (BEC). Spam blog PROOFPOINT
26.7.25 NET RFQ: Request for Quote Scammers Casting Wide Net to Steal Real Goods In this report, Proofpoint threat researchers take a deep dive into a widespread Request for Quote (RFQ) scam that involves leveraging common Net financing options (Net 15, 30, 45) to steal a variety of high value electronics and goods. Net financing of 15-90 days is the most common payment terms used by businesses. Spam blog PROOFPOINT
5.7.25 Task scams: Why you should never pay to get paid

Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.

Spam blog Eset
14.6.25 Trapped by a Call: The Digital Arrest Scam Digital Arrest Scam: It all starts with a phone call that seems routine at first—measured, official-sounding, and unexpectedly serious. On the other end is someone claiming to represent a government body, calmly accusing you of crimes you’ve never committed—drug... Spam blog Seqrite
7.6.25 Trapped by a Call: The Digital Arrest Scam Digital Arrest Scam: It all starts with a phone call that seems routine at first—measured, official-sounding, and unexpectedly serious. On the other end is someone claiming to represent a government body, calmly accusing you of crimes you’ve never committed—drug Spam blog Seqrite
1.6.25 U.S. Treasury Sanctions FUNNULL CDN, FBI Issues Advisory Warning Against Major Cyber Scam Facilitator The U.S. Department of the Treasury sanctioned Chinese-based content delivery network (CDN), FUNNULL, labeling it as a major distributor of online scams. The FBI concurrently released an advisory report to disseminate indicators of compromise (IOCs) associated with malicious cyber activities linked to FUNNULL. Spam blog Silent Push
12.4.25 The Expanding Attack Surface: Why Collaboration Tools Are the New Front Line in Cyberattacks The modern workplace has expanded beyond email. Attackers now exploit collaboration tools, supplier relationships and human trust to bypass defenses and compromise accounts. This five-part blog series raises awareness around these shifting attack tactics. And it introduces our holistic approach to protecting users. Spam blog PROOFPOINT
12.4.25 Unraveling the U.S. toll road smishing scams Cisco Talos has observed a widespread and ongoing financial theft SMS phishing (smishing) campaign since October 2024 that targets toll road users in the United States of America. Spam blog Palo Alto
1.3.25 Your item has sold! Avoiding scams targeting online sellers There are many risks associated with selling items on online marketplaces that individuals and organizations should be aware of when conducting business on these platforms. Spam blog

Cisco Blog

1.3.25 Deceptive Signatures: Advanced Techniques in BEC Attacks Business email compromise attacks have become increasingly common in recent years, driven by sophisticated social engineering tactics that make it easier to dupe victims. Spam blog

Cybereason

22.2.25

No, you’re not fired – but beware of job termination scams

Some employment scams take an unexpected turn as cybercriminals shift from “hiring” to “firing” staff

Spam blog

Eset

22.2.25

Changing the narrative on pig butchering scams

Hazel discusses Interpol’s push to rename pig butchering scams as ‘romance baiting’. Plus, catch up on the latest vulnerability research from Talos, and why a recent discovery is a “rare industry win”.

Spam blog

Cisco Blog