Spam Blog News(61)- 2024 2023 2022 2021 2020 2019 2018
APT blog Attack blog BigBrother blog BotNet blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog ICS blog Incident blog IoT blog Malware blog OS Blog Phishing blog Ransom blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
DATE | NAME | Info | CATEG. | WEB |
14.6.25 | Trapped by a Call: The Digital Arrest Scam | Digital Arrest Scam: It all starts with a phone call that seems routine at first—measured, official-sounding, and unexpectedly serious. On the other end is someone claiming to represent a government body, calmly accusing you of crimes you’ve never committed—drug... | Spam blog | Seqrite |
7.6.25 | Trapped by a Call: The Digital Arrest Scam | Digital Arrest Scam: It all starts with a phone call that seems routine at first—measured, official-sounding, and unexpectedly serious. On the other end is someone claiming to represent a government body, calmly accusing you of crimes you’ve never committed—drug | Spam blog | Seqrite |
1.6.25 | U.S. Treasury Sanctions FUNNULL CDN, FBI Issues Advisory Warning Against Major Cyber Scam Facilitator | The U.S. Department of the Treasury sanctioned Chinese-based content delivery network (CDN), FUNNULL, labeling it as a major distributor of online scams. The FBI concurrently released an advisory report to disseminate indicators of compromise (IOCs) associated with malicious cyber activities linked to FUNNULL. | Spam blog | Silent Push |
25.5.24 | A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist | Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk call—this time, over the phone. | Spam blog | Sophos |
17.5.24 | Spam campaign targeting Brazil abuses Remote Monitoring and Management tools | A new spam campaign is targeting Brazilian users with a clever twist — abusing the free trial period of trusted remote monitoring tools and the country’s electronic invoice system to spread malicious agents. | Spam blog | CISCO TALOS |
10.5.24 | Spam campaign targeting Brazil abuses Remote Monitoring and Management tools | A new spam campaign is targeting Brazilian users with a clever twist — abusing the free trial period of trusted remote monitoring tools and the country’s electronic invoice system to spread malicious agents. | Spam blog | CISCO TALOS |
12.4.25 | The Expanding Attack Surface: Why Collaboration Tools Are the New Front Line in Cyberattacks | The modern workplace has expanded beyond email. Attackers now exploit collaboration tools, supplier relationships and human trust to bypass defenses and compromise accounts. This five-part blog series raises awareness around these shifting attack tactics. And it introduces our holistic approach to protecting users. | Spam blog | PROOFPOINT |
12.4.25 | Unraveling the U.S. toll road smishing scams | Cisco Talos has observed a widespread and ongoing financial theft SMS phishing (smishing) campaign since October 2024 that targets toll road users in the United States of America. | Spam blog | Palo Alto |
1.3.25 | Your item has sold! Avoiding scams targeting online sellers | There are many risks associated with selling items on online marketplaces that individuals and organizations should be aware of when conducting business on these platforms. | Spam blog | |
1.3.25 | Deceptive Signatures: Advanced Techniques in BEC Attacks | Business email compromise attacks have become increasingly common in recent years, driven by sophisticated social engineering tactics that make it easier to dupe victims. | Spam blog | |
22.2.25 | ||||
22.2.25 |
Hazel discusses Interpol’s push to rename pig butchering scams as ‘romance baiting’. Plus, catch up on the latest vulnerability research from Talos, and why a recent discovery is a “rare industry win”. |
|||
2.11.24 | Google Voice scams: What are they and how do I avoid them? | Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers | Spam blog | |
2.11.24 | ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms | Telekopye transitions to targeting tourists via hotel booking scam | Spam blog | |
28.9.24 | Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam | Many spammers have elected to attack web pages and mail servers of legitimate organizations, so they may use these “pirated” resources to send unsolicited email. | Spam blog | Cisco Blog |
28.9.24 | Don’t panic and other tips for staying safe from scareware | Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics | Spam blog | |
14.9.24 | 6 common Geek Squad scams and how to defend against them | Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks | Spam blog | |
7.9.24 | Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe | The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams | Spam blog | |
31.8.24 | The Emerging Dynamics of Deepfake Scam Campaigns on the Web | Our researchers discovered dozens of scam campaigns using deepfake videos featuring the likeness of various public figures, including CEOs, news anchors and top government officials. | ||
17.8.24 | How a BEC scam cost a company $60 Million – Week in security with Tony Anscombe | Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme | Spam blog | |
17.8.24 | Why scammers want your phone number | Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data | Spam blog | |
17.8.24 | Top 6 Craigslist scams: Don’t fall for these tricks | Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun | Spam blog | |
13.7.24 | Hidden between the tags: Insights into spammers’ evasion techniques in HTML Smuggling | Talos is releasing a new list of CyberChef recipes that enable faster and easier reversal of encoded JavaScript code contained in the observed HTML attachments. | Spam blog | Cisco Blog |
13.7.24 | 5 common Ticketmaster scams: How fraudsters steal the show | Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account | Spam blog | Eset |
8.6.24 | The job hunter’s guide: Separating genuine offers from scams | $90,000/year, full home office, and 30 days of paid leave, and all for a job as a junior data analyst – unbelievable, right? This and many other job offers are fake though – made just to ensnare unsuspecting victims into giving up their data. | Spam blog | Eset |
4.5.24 | Adding insult to injury: crypto recovery scams | Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over | Spam blog | Eset |
31.3.24 | Borrower beware: Common loan scams and how to avoid them | Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan. | Spam blog | Eset |
23.3.24 | You’re going to start seeing more tax-related spam, but remember, that doesn’t actually mean there’s more spam | It’s important to be vigilant about tax-related scams any time these deadlines roll around, regardless of what country you’re in, but it’s not like you need to be particularly more skeptical in March and April. | Spam blog | Cisco Blog |
9.3.24 | Top 10 scams targeting seniors – and how to keep your money safe | The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud. | Spam blog | Eset |
4.2.24 | ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign | Unit 42 researchers discovered a large-scale campaign we call ApateWeb that uses a network of over 130,000 domains to deliver scareware, potentially unwanted programs (PUPs) and other scam pages. Among these PUPs, we have identified several adware programs including a rogue browser and different browser extensions. | Spam blog | Palo Alto |
20.1.24 | Virtual kidnapping: How to see through this terrifying scam | Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims | Spam blog | Eset |
20.1.24 | Is Temu safe? What to know before you ‘shop like a billionaire’ | Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal | Spam blog | Eset |