Fake

  • Blog

    People keep putting fake walls in front of Teslas

    Someone has responded to YouTuber Mark Rober’s Tesla fake wall test with a video that also tries to address the question of whether the company’s Full Self-Driving (FSD) features would detect a Wile E. Coyote-style road obstruction in the real world. Creator Kyle Paul posted his video Thursday and included two Teslas with FSD: a Model Y equipped with a…

    Read More »
  • Blog

    Fake Semrush ads used to steal SEO professionals’ Google accounts

    A new phishing campaign is targeting SEO professionals with malicious Semrush Google Ads that aim to steal their Google account credentials. Malwarebytes researcher Jerome Segura and SEO strategist Elie Berreby believe that the threat actor is after Google Ads accounts that would enable them to create new malvertising campaigns. This type of “cascading fraud” has been gaining traction recently, as Malwarebytes uncovered in January a…

    Read More »
  • Blog

    Google sues alleged scammers over 10,000 fake Maps listings

    Google is taking down 10,000 fake business listings from Google Maps and suing a network of scammers who set them up, CBS News reports. The company’s lawsuit alleges that a man connected to a broader scam network created fake business profiles on Google Maps and sold them for profit. Google was tipped off by a Texas-based locksmith who said someone…

    Read More »
  • Blog

    Fake “Security Alert” issues on GitHub use OAuth app to hijack accounts

    A widespread phishing campaign has targeted nearly 12,000 GitHub repositories with fake “Security Alert” issues, tricking developers into authorizing a malicious OAuth app that grants attackers full control over their accounts and code. “Security Alert: Unusual Access Attempt We have detected a login attempt on your GitHub account that appears to be from a new location or device,” reads the…

    Read More »
  • Blog

    ClickFix attack delivers infostealers, RATs in fake Booking.com emails

    Microsoft is warning that an ongoing phishing campaign impersonating Booking.com is using ClickFix social engineering attacks to infect hospitality workers with various malware, including infostealers and RATs. The campaign started in December 2024 and continues today, targeting employees at hospitality organizations such as hotels, travel agencies, and other businesses that use Booking.com for reservations. The threat actors’ goal is to hijack…

    Read More »
  • Blog

    Coinbase phishing email tricks users with fake wallet migration

    A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with a pre-generated recovery phrase controlled by attackers. The emails have a subject of “Migrate to Coinbase Wallet” and state that all customers must transition to self-custodial wallets. The email also provides instructions on how to download the legitimate Coinbase Wallet.…

    Read More »
  • Blog

    Fake BianLian ransom notes mailed to US CEOs in postal mail scam

    Scammers are impersonating the BianLian ransomware gang in fake ransom notes sent to US companies via snail mail through the United States Postal Service. The fake ransom notes were first reported by Guidepoint Security today, with BleepingComputer later being sent a scan of the note from a CEO who received the same letter. The envelopes for these ransom notes claim to…

    Read More »
  • Blog

    How to spot a fake Facebook account

    Fake Facebook accounts are a pervasive issue. They are used for various malicious activities, ranging from spreading misinformation to conducting phishing scams. Identifying these accounts is crucial for protecting yourself and your online community. This post provides practical tips and techniques to help you spot fake Facebook profiles. Why fake Facebook accounts are created Understanding the motivations behind fake accounts…

    Read More »
  • Blog

    Fake CS2 tournament streams used to steal crypto, Steam accounts

    Threat actors are exploiting major Counter-Strike 2 (CS2) competitions, like IEM Katowice 2025 and PGL Cluj-Napoca 2025, to defraud gamers and steal their Steam accounts and cryptocurrency. Although CS2 first launched 13 years ago, it still maintains a massive community of plays and an active professional competition landscape with multi-million rewards. Characteristically, earlier this month, CS2 achieved a new peak…

    Read More »
  • Blog

    Macs under threat from new info-stealing malware spread through fake browser updates — how to stay safe

    When it comes to staying safe online, one thing I always recommend is to keep your computer updated along with the software you use everyday. The problem now though, is that hackers are capitalizing on this advice and as you might have guessed, are using it to spread dangerous info-stealing malware targeting Macs, PCs and even Android phones. As reported…

    Read More »
Back to top button
close