This devious phishing site repurposes legitimate web elements like CAPTCHA pages for malware distribution

Phishing campaign mimics CAPTCHA to deliver hidden malware commandsPowerShell command hidden in verification leads to Lumma Stealer attackEducating users on phishing tactics is key to preventing such attacks CloudSek has…

Continue Reading This devious phishing site repurposes legitimate web elements like CAPTCHA pages for malware distribution

New wave of sextortion scams uses personal details and images to intimidate targets while bypassing traditional security measures

Sextortion scams evolve with personalized tactics and heightened intimidation.Threat actors exploit invoicing platforms to bypass email security filters.Robust email filters and training help counter sextortion threats effectively. Sextortion scams are…

Continue Reading New wave of sextortion scams uses personal details and images to intimidate targets while bypassing traditional security measures

Social Security Administration axes pages referring to changing gender or sexual identity

Keen-eyed individuals spotted another blow to LGBTQ protections under the U.S.'s new presidential administration.First flagged by Media Matters for America journalist Ari Drennen, the official page for changing sexual (or…

Continue Reading Social Security Administration axes pages referring to changing gender or sexual identity