The Growing Trend of Telegram as a Marketplace for Phishing Tools and Services

Cybercrime is becoming increasingly common as businesses continue to rely on technology to conduct their operations. Cybercriminals are constantly looking for new ways to exploit businesses and individuals. One of the methods gaining popularity is using Telegram, a popular messaging app that offers end-to-end encryption. Telegram has become a hub for selling phishing tools and services due to its secure …

AlienFox Malware: The Swiss Army Knife of Cloud Attacks

Researchers at SentinelLabs have uncovered a new, modular malware toolkit called “AlienFox.” Cybercriminals use AlienFox to breach email and web hosting services. It compromises misconfigured hosts on cloud platforms and takes sensitive data.  You can often find this new toolkit in Telegram groups. Researchers call AlienFox a “Swiss Army knife” toolkit because of its versatility. Understanding AlienFox AlienFox is a …

TMX Finance Data Breach: What You Need to Know

TMX Finance has been providing underserved consumers with credit products since 1998. Unfortunately, the company suffered a massive data breach that went undetected for months. It involved all TMX subsidiaries, namely TitleMax, InstaLoans, and TitleBucks. The incident affected over 4.8 million customers across all its services. A Timeline of the TMX Finance Data Breach The data breach happened in December …

cybercrime photo

4 Dark Web Threats Businesses Need to Watch

The dark web is constantly evolving to present a thorny ticket of hazards for businesses. The point of origin for many of today’s most nasty and damaging cyberattacks, the dark web is the world’s third-largest economy and unlike many of the world’s industries, constantly growing. Dark web threats Cybersecurity Ventures predicts that global cybercrime costs will grow by 15% per …

AT&T Data Breach – 9 Million Affected

In a recent statement, telecommunications giant AT&T confirmed that a hack on a vendor it was working with exposed around 9 million accounts. AT&T said that the sensitive information was mainly about device upgrade eligibility. The hacking happened in January 2023 using a weakness in the vendor’s system. The hackers accessed customer data, such as their names, addresses, phone numbers, …

Cerebral Data Breach – 3.18 Million Affected

Cerebral, an online platform that offers mental health care services, recently suffered a data breach that may have affected up to 3.18 million users. According to its report, the breach was due to the company’s use of third-party pixel trackers. Cerebral did not say the exact number of users affected. However, the company said it had taken steps to ease …

Hatch Bank Falls Victim to Data Breach

Hatch Bank confirmed a data breach that compromised its customers’ personal data. The financial technology firm said hackers found a vulnerability in its internal file-transfer software. This allowed the hackers to access and steal around 140,000 customer names and social security numbers from Jan. 30-31, 2023. Hatch is using Fortra’s GoAnywhere file-transfer platform. Many other large businesses also use GoAnywhere …

Chick-fil-A Confirms Credential Stuffing Attack

Credential stuffing is one of the many forms of cyberattacks on the rise. It’s a low-risk, low-cost automated method. It uses bots to access username-password combinations from past data breaches. It then uses that information to exfiltrate data from a new target system. It relies on people’s habit of reusing the same login credential across various sites. Chick-fil-A is one …

News Corp Cyberattack

News Corporation (News Corp) has disclosed more information about the 2022 cyberattack against the major publishing conglomerate. News Corp revealed that the cybercriminals had access to its systems two years ago, starting in Feb. 2020. News Corp recently sent notification letters to affected employees. These laid out the most recent information on the data breach. The breach affected workers at …

GPT-3 Makes Phishing Scams Worse

GPT-3 Makes Phishing Scams Like These Worse

Phishing attacks have reached a new high, with cybercriminals favoring various phishing techniques to trap their victims in nasty phishing scams. Hackers use different phishing techniques as a precursor to many devastating cyberattacks like ransomware, business email compromise (BEC), malware and account takeover. As perpetrators use deceiving social engineering lures, their targets often fall prey to their tricks. That’s why …