News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Fake LinkedIn Emails Contain Malware, Warns Security Expert

LinkedIn's InMail notification emails have been spoofed by cybercriminals to distribute malware. The emails are laced with phishing tactics, including fake companies, images, and notifications from legitimate platforms. Researchers at Cofense Intelligence warn that the attackers are using a ConnectWise Remote Access Trojan (RAT) to gain unauthorized control over systems.

See Also

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.76

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.76

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.74

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.74

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks Δ1.72

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.

YouTube Warns of Phishing Video Using Its CEO as Bait Δ1.72

YouTube has issued a warning to its users about an ongoing phishing scam that uses an AI-generated video of its CEO, Neal Mohan, as bait. The scammers are using stolen accounts to broadcast cryptocurrency scams, and the company is urging users not to click on any suspicious links or share their credentials with unknown parties. YouTube has emphasized that it will never contact users privately or share information through a private video.

North Korean Fake Job Hackers Are Going the Extra Mile to Make Sure Their Scams Seem Legit Δ1.72

Researchers have uncovered a network of fake identities created by North Korean cybercriminals, all looking for software development work in Asia and the West. The goal is to earn money to fund Pyongyang's ballistic missile and nuclear weapons development programs. By creating these fake personas, hackers are able to gain access to companies' back ends, steal sensitive data, or even get paid.

The Importance of Not Deleting Spam Emails Period Δ1.72

Spam emails are an inevitable part of our online experience, but instead of deleting them, we should consider marking them. This teaches the spam filter to better recognize and catch unwanted emails, reducing the amount of junk mail in our inboxes. By doing so, we also help prevent scammers from mistakenly believing their messages have been reported, thereby protecting ourselves and others from potential harm. The benefits of this approach are clear, but it requires a change in behavior from simply deleting spam emails to taking an active role in training the filters to improve.

Infostealer Malware Stole 493 Million Accounts: How Your Data May Have Been Compromised Δ1.72

Recently, news surfaced about stolen data containing billions of records, with 284 million unique email addresses affected. Infostealing software is behind a recent report about a massive data collection being sold on Telegram, with 23 billion entries containing 493 million unique pairs of email addresses and website domains. As summarized by Bleeping Computer, 284 million unique email addresses are affected overall.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.72

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

How AI Is Revolutionizing Online Education Platforms Δ1.72

LinkedIn Learning delivers over 21,000+ expert-led courses for a simple monthly fee through its app, providing users with unlimited access to learning content at their own pace. The platform's feature-rich interface includes video recordings, written transcripts, and Q&A sections, making it an attractive option for those looking to upskill or reskill in the age of AI. By leveraging LinkedIn Learning, individuals can tap into a vast library of courses on various subjects, from business and technology to creative fields.

Deepfakes Scam YouTube Creators with AI-Generated Videos Δ1.72

YouTube creators have been targeted by scammers using AI-generated deepfake videos to trick them into giving up their login details. The fake videos, including one impersonating CEO Neal Mohan, claim there's a change in the site's monetization policy and urge recipients to click on links that lead to phishing pages designed to steal user credentials. YouTube has warned users about these scams, advising them not to click on unsolicited links or provide sensitive information.

Protecting Yourself From Tax-Related Scams in 2025: 10 Expert Tips Δ1.71

Almost half of people polled by McAfee say they or someone they know has received a text or phone call from a scammer pretending to be from the IRS or a state tax agency, highlighting the growing threat of tax-related scams. The scammers use various tactics, including social media posts, emails, text messages, and phone calls, to target potential victims, often with promising fake refunds. To protect themselves, individuals can take steps such as filing their taxes early, monitoring their credit reports, watching out for phishing attacks, and being cautious of spoofed websites.

Your Email Address Is Your Digital Passport, Not Just a Password Δ1.71

In the realm of cybersecurity, the emphasis on strong passwords often overshadows the critical importance of protecting one's email address, which serves as a digital identity. Data breaches and the activities of data brokers expose email addresses to threats, making them gateways to personal information and potential scams. Utilizing email aliases can offer a practical solution to mitigate these risks, allowing individuals to maintain privacy while engaging online.

Snail Mail Spam Takes Center Stage in Ransomware Campaigns Δ1.71

A company's executives received an extortion letter in the mail claiming to be from BianLian ransomware group, demanding payment of $250,000 to $350,000 in Bitcoin within ten days. However, cybersecurity researchers have found that the attacks are likely fake and the letter's contents bear no resemblance to real ransom notes. Despite this, the scammers are using a new tactic by sending physical letters, potentially as part of an elaborate social engineering campaign.

The Dark Side of Chrome Extensions: Hidden Dangers Lurking on Your PC Δ1.71

As recent news reminds us, malicious browser add-ons can start life as legit extensions. Reviewing what you’ve got installed is a smart move. Earlier this month, an alarm sounded—security researchers at GitLab Threat Intelligence discovered a handful of Chrome extensions adding code in order to commit fraud, with at least 3.2 million users affected. But the add-ons didn’t start as malicious. Instead, they launched as legitimate software, only to be later compromised or sold to bad actors.

The Rise of Fake Spyware Apps in the Play Store Δ1.71

Google's security measures have been breached by fake spyware apps, which are hidden in plain sight on the Google Play Store. These malicious apps can cause immense damage to users' devices and personal data, including data theft, financial fraud, malware infections, ransomware attacks, and rootkit vulnerabilities. As a result, it is crucial for smartphone users to take precautions to spot these fake spyware apps and protect themselves from potential harm.

Cyberattack Rocks Polish Space Agency's Email Systems Δ1.71

The Polish Space Agency (POLSA) has confirmed it suffered a cyberattack that compromised its email systems, forcing it to shut down its IT infrastructure. The attack appears to be an email compromise, with insiders suggesting that relevant authorities have been notified and the agency is analyzing the situation. POLSA's machines were disconnected from the internet as part of the incident.

Fix Temporary Email - 4 Smart Free Services Δ1.70

If you avoid exposing your regular email address, you reduce the risk of being spammed. Temporary email services offer a solution to this problem by providing short-term addresses that can be used on untrustworthy websites without compromising your primary inbox. These services allow users to receive verification codes or messages within a limited time frame before expiring.

Google Unveils Shielded Email Feature to Protect User Inboxes. Δ1.70

Google is working on a new feature called Shielded Email, which aims to protect users from unwanted emails by creating an alias address when signing up for new accounts. This feature uses Google's autofill features to automatically forward emails sent to the alias address to the user's main email address, allowing them to easily block or unsubscribe from unwanted emails. By using a separate alias address, Shielded Email provides a buffer between users and service providers, making it harder for bad actors to track their online activity.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.70

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

Businesses Are Worried About AI Use in Cyberattacks Δ1.70

Artificial Intelligence (AI) is increasingly used by cyberattackers, with 78% of IT executives fearing these threats, up 5% from 2024. However, businesses are not unprepared, as almost two-thirds of respondents said they are "adequately prepared" to defend against AI-powered threats. Despite this, a shortage of personnel and talent in the field is hindering efforts to keep up with the evolving threat landscape.

Zapier Data Breach Raises Concerns Over Customer Information Security. Δ1.70

Zapier, a popular automation tool, has suffered a cyberattack that resulted in the loss of sensitive customer information. The company's Head of Security sent a breach notification letter to affected customers, stating that an unnamed threat actor accessed some customer data "inadvertently copied to the repositories" for debugging purposes. Zapier assures that the incident was isolated and did not affect any databases, infrastructure, or production systems.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.69

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

New Spyware Found to Be Snooping on Thousands of Android and Ios Users Δ1.69

A recent discovery has revealed that Spyzie, another stalkerware app similar to Cocospy and Spyic, is leaking sensitive data of millions of people without their knowledge or consent. The researcher behind the finding claims that exploiting these flaws is "quite simple" and that they haven't been addressed yet. This highlights the ongoing threat posed by spyware apps, which are often marketed as legitimate monitoring tools but operate in a grey zone.