Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2024

The Growing Threat Of Fake Job Applicants

It cannot be denied that the rise of remote work has opened up many opportunities for both employers and job seekers. Despite this, however, it has also presented a plethora of challenges when it comes to recruiting in the cybersecurity and tech spaces, one of the most notable of which is the proliferation of candidates who either don’t exist entirely or who aren’t who they claim to be.

Facebook Marketplace Scams To Avoid in 2024

In 2024, you should avoid several Facebook Marketplace scams, including those related to mobile payments, gift cards, stolen items and rental properties. Facebook Marketplace is part of Facebook and it allows you to buy or sell items from local individuals or small businesses. Since some Facebook Marketplace transactions occur online, there are various ways you could fall victim to these types of scams.

Ten Ways You Can Avoid Debit Card Fraud

Having your debit card information stolen or used by someone else to impersonate you can be stressful and damaging to your finances and identity. To avoid becoming a victim of debit card fraud, you should secure your bank accounts with strong passwords, use your credit card for purchases, be cautious of phishing scams and more. Continue reading to learn what debit card fraud is and how to avoid becoming a victim of it.

Top 10 Fraud Protection Services

Fraud isn’t just evolving- it’s exploding. What once involved old-fashioned pickpockets and stolen wallets is now a digital battlefield. And scammers are getting increasingly creative, too. From sophisticated cloned websites to deceptive phishing schemes, they are making it substantially harder for businesses to protect themselves and their customers.

Introducing Ephemeral IDs: a new tool for fraud detection

In the early days of the Internet, a single IP address was a reliable indicator of a single user. However, today’s Internet is more complex. Shared IP addresses are now common, with users connecting via mobile IP address pools, VPNs, or behind CGNAT (Carrier Grade Network Address Translation). This makes relying on IP addresses alone a weak method to combat modern threats like automated attacks and fraudulent activity.

Major X Accounts Hack Fizzles in Botched Crypto Scam Attempt

A wave of X account hacks has led to the rapid success of a pump-and-dump scheme for the $HACKED Solana token, with users rushing to buy in. High-profile accounts compromised in this attack include MoneyControl (1.4 million followers), People Magazine (7.8 million), and EUinmyRegion, run by the European Commission, with nearly 100,000 followers. Moreover, Computer brand Lenovo’s India division, film director Oliver Stone, Yahoo News UK, and Brazilian soccer player Neymar Jr.

Zscaler: There are 200 Malicious Lookalike Domains for Every 1 Impersonated Brand

Analysis of typosquatting and brand impersonation activity across 500 of the most visited domains provides insight in to how these techniques come together to effectively deceive. From February 2024 to July 2024, Zscaler’s ThreatLabz tracked more than 30,000 lookalike domains that impersonated some of the world’s most well-known brands.

Common Telegram Scams To Be Aware Of

Telegram is a messaging platform people use to communicate in large groups or broadcast messages in channels. Some common scams on Telegram include fake channels, tech support scams, phishing scams and cryptocurrency scams. The consequences of falling for these scams could include losing money, having your device infected with malware or even having your identity stolen. Continue reading to learn the seven most common types of scams on Telegram so you can avoid falling victim to these scams.

How to Prevent SEO Poisoning: Phishing's New Partner in Crime

Like the speed of light, phishing remains a reliable constant in the cybercrime universe, never going out of fashion with fraudsters, always reinventing itself to stay relevant. As part of that reinvention, phishing-related scams increasingly use search engine optimization (SEO) to drive malicious websites higher in search results, outranking legitimate sites whose brands they often impersonate.

What Are Deepfakes?

A deepfake is a form of media, such as a photo or video, generated by Artificial Intelligence (AI) to depict real or non-existent people performing actions they never did. AI manipulates a picture, video or voice recording to analyze a person’s characteristics and then blends those characteristics with existing footage using unique algorithms.

5 Ways to Prevent Subscription Abuse

The subscription model is a gift that keeps on giving. For customers, it offers convenience, flexibility, and continuous access to the services or products they love. For businesses, it creates a steady and predictable revenue stream, fosters long-term customer relationships, and provides valuable insights into user behavior. But here’s a third player in the game that loves subscriptions just as much: fraudsters.

BEC Scams Have Caused $55 Billion in Losses Over the Past Ten Years

Business email compromise (BEC) attacks have caused more than $55 billion in losses between 2013 and 2023, according to an advisory from the U.S. Federal Bureau of Investigation (FBI). “The BEC scam continues to target small local businesses to larger corporations, and personal transactions while evolving in their techniques to access those business or personal accounts,” the FBI says.

Authorized Push Payment Fraud Responsible for Over Half of U.K. Frauds and Scams

Research from The Financial Ombudsman Service, a U.K. based organization dedicated to helping citizens with free financial advice, has found an increase in Authorized Pushed Payment (APP) scams. These attacks are rising both in number and sophistication. The Financial Ombudsman Service is a U.K. organization dedicated to helping residents with all things financial-as-a-free service. As part of this service, they take in a large number of complaints around financial fraud.

New Latin American fraud rules demand real-time action: Is your bank ready?

With Latin America facing an unprecedented increase in claims for unrecognized credit and debit card transactions, banks and card issuers are directly feeling the impact of fraud and cyber-attacks that are growing more sophisticated by the day. Recent regulations have been implemented across Latin America to address a variety of payment fraud, including an unprecedented surge in claims of unrecognized transactions involving debit, credit and financing products.

Losses From Investment Scams have Increased Six-Fold Since 2021

The Better Business Bureau (BBB) has observed a six-fold increase in losses from investment scams over the past three years. The BBB has received more than 4,000 reports of investment scams since 2020, with the median reported loss rising from $1,000 in 2021 to almost $6,000 in 2024.

5 Recent Examples of Fake Websites

What do bank account takeovers, credit card scams, purchase of counterfeit goods, and frequent flier mile theft, all have in common? All these cyber crimes usually begin with a user visiting a fake website. In the first quarter of 2024, over 963,000 unique phishing sites were detected worldwide. Phishing sites are just one category of fake websites that mimic legitimate sites to steal information. The overall scope of fake websites is likely much broader.

How to Prevent Online Gaming Scams: A Guide for Gamers

Online gaming has become a global phenomenon, connecting millions of people worldwide and providing endless hours of entertainment. However, with its growing popularity comes a set of unique challenges, including the increasing risk of scams. From phishing emails to in-game item scams, these threats are becoming more sophisticated, targeting players of all ages and skill levels. Falling victim to such scams can result in financial loss, compromised accounts, and even damage to your device.

The Invisible Risk of Mobile Apps: PWA Fraud and How to Prevent It

Almost a decade after their emergence, Progressive Web Apps (PWAs) finally went mainstream in 2024. Their MO? To compete with, and in some cases replace native apps. To do this, PWAs promise to combine the best features of web and native mobile apps, delivering seamless, reliable, and engaging experiences across all devices and platforms. Cross-platform compatibility, direct distribution, cost and maintenance advantages – it all sounds very alluring.

What To Do if You Give Your Card Details to a Scammer

Did you fall for a scam and accidentally give your card details to a scammer? To protect yourself and your finances, you should lock your card, contact your card issuer and freeze your credit report. Continue reading to learn what you should do if you’ve fallen for a scam and how you can avoid scams in the future.

How To Spot a Credit Card Skimmer

According to the FBI, credit card skimming costs individuals and banks approximately $1 billion annually. You can spot a credit card skimmer by searching for a tampered security seal, checking for misalignments, wiggling the card reader or looking inside the card reader. Continue reading to learn more about credit card skimmers, how to spot them and what you can do if your card gets skimmed.

Threat Actors Increasingly Exploit Deepfakes for Social Engineering

The availability of deepfake technology has given threat actors a valuable tool for social engineering attacks, according to researchers at BlackBerry. “Typically, online scams prey on the presumed weaknesses and susceptibility of the targeted individual,” the researchers write.

Major Scam Operation Uses Deepfake Videos

Researchers at Palo Alto Networks’ Unit 42 are tracking dozens of scam campaigns that are using deepfake videos to impersonate CEOs, news anchors, and high-profile government officials. Unit 42 believes a single threat actor is behind the scheme. The researchers discovered hundreds of domains used to spread these campaigns, each of which has been visited an average of 114,000 times. The goal of the operation is to spread investment scams and fake government-sponsored giveaways.

Account Takeover Protection: What It Is and How It Combats ATO Fraud

Think about how many employees work at your organization. Now think about how many sensitive files each one can access. A single compromised user account could lead to an extortion scam, a ransomware attack, or even a data breach. If you haven’t reviewed your account takeover protection protocols in a while, now is the time. Account takeover (ATO) protection is not a single countermeasure, but rather a whole set of cybersecurity measures.