Fake
-
Blog
Hackers are using fake Booking.com sites to infect summer travelers with dangerous malware — how to stay safe
Summer is here and if you haven’t booked your holiday travel plans yet, you’re going to want to be extra careful when doing so. The reason being, hackers are now using popular booking sites to infect unsuspecting travelers with dangerous password-stealing malware. According to the cybersecurity firm Malwarebytes, a new campaign has been spotted online that uses malicious links on…
Read More » -
Blog
Hackers are using fake tool installers to dupe victims – and AI tools like ChatGPT are a key target
Cyber criminals are spreading malware disguised as popular tool installers to target B2B sales and the technology and marketing sectors, according to new threat research. Cisco Talos said it has found the CyberLock and Lucky_Gh0$t ransomware, along with a newly-discovered malware dubbed ‘Numero’, masquerading as popular and legitimate AI tool installers to dupe victims. Chetan Raghuprasad, a cybersecurity researcher at…
Read More » -
Blog
Fake Zenmap. WinMRT sites target IT staff with Bumblebee malware
The Bumblebee malware SEO poisoning campaign uncovered earlier this week aimpersonating RVTools is using more typosquatting domainsi mimicking other popular open-source projects to infect devices used by IT staff. BleepingComputer was able to find two cases leveraging the notoriety of Zenmap, the GUI for the Nmap network scanning tool, and the WinMTR tracerout utility. Both of these tools are commonly used by IT staff…
Read More » -
Blog
Hackers use fake Ledger apps to steal Mac users’ seed phrases
Cybercriminal campaigns are using fake Ledger apps to target macOS users and their digital assets by deploying malware that attempts to steal seed phrases that protect access to digital cryptocurrency wallets. Ledger is a popular hardware-based wallet designed to store cryptocurrency offline (cold storage) and in a secure manner. A seed or recovery phrase is a set of 12 or 24 random…
Read More » -
Blog
Fake KeePass password manager leads to ESXi ransomware attack
Threat actors have been distributing trojanized versions of the KeePass password manager for at least eight months to install Cobalt Strike beacons, steal credentials, and ultimately, deploy ransomware on the breached network. WithSecure’s Threat Intelligence team discovered the campaign after they were brought in to investigate a ransomware attack. The researchers found that the attack started with a malicious KeePass…
Read More » -
Blog
How to spot fake job scams in 2025
Navigating the job market requires skill, determination, and a keen awareness of potential pitfalls, especially when it comes to online searches. The search for a new job can be exciting and hopeful, but it’s also a time when job seekers are vulnerable to scams. Unfortunately, fake job postings are a prevalent issue, designed to trick unsuspecting applicants out of their…
Read More » -
Blog
iClicker site hack targeted students with malware via fake CAPTCHA
The website of iClicker, a popular student engagement platform, was compromised in a ClickFix attack that used a fake CAPTCHA prompt to trick students and instructors into installing malware on their devices. iClicker is a subsidiary of Macmillan and is a digital classroom tool that allows instructors to take attendance, ask live questions or surveys, and track student engagement. It…
Read More » -
Blog
Fake AI video generators drop new Noodlophile infostealer malware
Fake AI-powered video generation tools are being used to distribute a new information-stealing malware family called ‘Noodlophile,’ under the guise of generated media content. The websites use enticing names like the “Dream Machine” and are advertised on high-visibility groups on Facebook, posing as advanced AI tools that generate videos based on uploaded user files. Although the use of AI tools…
Read More » -
Blog
How to win fake friends and influence fake people – Computerworld
We’re all talking to fakepeople now, but most people don’t realize that interacting with AI is a subtleand powerful skill that can and should be learned.The first step in developingthis skill set is to acknowledge to yourself what kind of AI you’re talking toand why you’re talking to it. AI voice interfaces arepowerful because our brains are hardwired for human…
Read More » -
Blog
What People Are Getting Wrong This Week: Fake News About Karoline Leavitt
There’s a new star in the firmament of fake new: White House Press Secretary Karoline Leavitt. Known for her combative press conferences, Leavitt is at the center of a tornado of misinformation that is being spread on both sides of the political spectrum. To set the record straight on two of the most viral fake Leavitt stories: She did not…
Read More »