News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

What Is Vishing? Voice Phishing Is Surging - Expert Tips on How to Spot It and Stop It

Vishing has become a prevalent tactic for cybercriminals, with 442% increase in attacks compared to the first half of 2024, according to CrowdStrike's latest report. The security firm tracked at least six campaigns involving attackers posing as IT staffers to convince employees to set up remote support sessions or share sensitive information. Help desk social engineering tactics are often used, where scammers create a sense of urgency to trick victims into divulging credentials.

See Also

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.91

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.78

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Protecting Yourself From Tax-Related Scams in 2025: 10 Expert Tips Δ1.75

Almost half of people polled by McAfee say they or someone they know has received a text or phone call from a scammer pretending to be from the IRS or a state tax agency, highlighting the growing threat of tax-related scams. The scammers use various tactics, including social media posts, emails, text messages, and phone calls, to target potential victims, often with promising fake refunds. To protect themselves, individuals can take steps such as filing their taxes early, monitoring their credit reports, watching out for phishing attacks, and being cautious of spoofed websites.

E-ZPass Smishing Scam Targets People with Urgent Toll Demands Δ1.74

The E-ZPass smishing scam is targeting people with urgent toll demands, sending fraudulent text messages that threaten fines and license revocation if payment is not made promptly. The scammers aim to capture personal information by directing victims to a fake link, which can result in identity theft. In reality, it's the scammers who are seeking financial gain.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.73

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

More Reports Claim 2024 Was the Worst Year for Ransomware Attacks Yet. Δ1.73

2024 has been marked as a record-breaking year for ransomware attacks, with a 65% increase in detected groups and 44 new malware variants contributing to almost a third of undisclosed attacks. The healthcare, government, and education sectors were disproportionately affected, while emerging groups like LockBit and RansomHub accounted for a significant number of incidents, highlighting the growing sophistication of cybercriminals. As organizations face escalating financial and reputational risks, the need for proactive cybersecurity measures has never been more urgent.

Web DDoS Attacks See Major Surge as AI Allows More Powerful Attacks Δ1.73

Layer 7 Web DDoS attacks have surged by 550% in 2024, driven by the increasing accessibility of AI tools that enable even novice hackers to launch complex campaigns. Financial institutions and transportation services reported an almost 400% increase in DDoS attack volume, with the EMEA region bearing the brunt of these incidents. The evolving threat landscape necessitates more dynamic defense strategies as organizations struggle to differentiate between legitimate and malicious traffic.

Snail Mail Spam Takes Center Stage in Ransomware Campaigns Δ1.72

A company's executives received an extortion letter in the mail claiming to be from BianLian ransomware group, demanding payment of $250,000 to $350,000 in Bitcoin within ten days. However, cybersecurity researchers have found that the attacks are likely fake and the letter's contents bear no resemblance to real ransom notes. Despite this, the scammers are using a new tactic by sending physical letters, potentially as part of an elaborate social engineering campaign.

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.72

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks Δ1.71

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.71

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Deepfake Scam Calls Are Costing British Victims Hundreds Each Time - Here's How to Stay Safe Δ1.71

The average scam cost the victim £595, report claims. Deepfakes are claiming thousands of victims, with a new report from Hiya detailing the rising risk and deepfake voice scams in the UK and abroad, noting how the rise of generative AI means deepfakes are more convincing than ever, and attackers can leverage them more frequently too. AI lowers the barriers for criminals to commit fraud, and makes scamming victims easier, faster, and more effective.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.71

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

Infostealer Malware Stole 493 Million Accounts: How Your Data May Have Been Compromised Δ1.71

Recently, news surfaced about stolen data containing billions of records, with 284 million unique email addresses affected. Infostealing software is behind a recent report about a massive data collection being sold on Telegram, with 23 billion entries containing 493 million unique pairs of email addresses and website domains. As summarized by Bleeping Computer, 284 million unique email addresses are affected overall.

Malware Botnet Spreads Across 1.6 Million Android Tvs Δ1.70

The Vo1d botnet has infected over 1.6 million Android TVs, with its size fluctuating daily. The malware, designed as an anonymous proxy, redirects criminal traffic and blends it with legitimate consumer traffic. Researchers warn that Android TV users should check their installed apps, scan for suspicious activity, and perform a factory reset to clean up the device.

Accidentally Texting with Scammers? Google's AI Is Here to Stop the Chat Cold Δ1.70

Google has introduced AI-powered features designed to enhance scam detection for both text messages and phone calls on Android devices. The new capabilities aim to identify suspicious conversations in real-time, providing users with warnings about potential scams while maintaining their privacy. As cybercriminals increasingly utilize AI to target victims, Google's proactive measures represent a significant advancement in user protection against sophisticated scams.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.70

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.

5 Easy Browser Tweaks That Secure Your Web Surfing Δ1.70

Modern web browsers offer several built-in settings that can significantly enhance data security and privacy while online. Key adjustments, such as enabling two-factor authentication, disabling the saving of sensitive data, and using encrypted DNS requests, can help users safeguard their personal information from potential threats. Additionally, leveraging the Tor network with specific configurations can further anonymize web browsing, although it may come with performance trade-offs.

Avoid Unexpected Credit Card Charges With My Ultimate Online Shopping Hack Δ1.70

Using virtual cards can significantly enhance online shopping security by allowing consumers to manage their spending and limit exposure to fraud. Services like Privacy.com enable users to create virtual card numbers with specific spending limits, making it easier to handle subscriptions and free trials without the risk of unexpected charges. This method not only protects personal financial information but also offers peace of mind when dealing with unfamiliar vendors.

YouTube Warns of Phishing Video Using Its CEO as Bait Δ1.70

YouTube has issued a warning to its users about an ongoing phishing scam that uses an AI-generated video of its CEO, Neal Mohan, as bait. The scammers are using stolen accounts to broadcast cryptocurrency scams, and the company is urging users not to click on any suspicious links or share their credentials with unknown parties. YouTube has emphasized that it will never contact users privately or share information through a private video.

Broadcom Releases Fixes for Multiple VMware Security Flaws Δ1.69

Broadcom has released patches for three critical vulnerabilities in its VMware products, which are already being exploited in the wild. The bugs were described as VM escape flaws and affect all supported versions of VMware ESX, vSphere, Cloud Foundation, and Telco Cloud Platform. These issues were deemed severe enough to warrant immediate attention from users, who are urged to apply the fixes as soon as possible.

Global eSIM Shipment Volume Surpasses Half a Billion Units as Demand Keeps on Growing Δ1.69

The global eSIM market has experienced significant growth, with shipments reaching 503 million units in 2024, representing a 35% year-on-year increase. This surge in demand is attributed to the increasing adoption of eSIMs for international travel, resulting in a 56% rise in eSIM profile downloads. The improved economic landscape and advancements in smartphone technology have also contributed to the growth of eSIM sales.

The Importance of Not Deleting Spam Emails Period Δ1.69

Spam emails are an inevitable part of our online experience, but instead of deleting them, we should consider marking them. This teaches the spam filter to better recognize and catch unwanted emails, reducing the amount of junk mail in our inboxes. By doing so, we also help prevent scammers from mistakenly believing their messages have been reported, thereby protecting ourselves and others from potential harm. The benefits of this approach are clear, but it requires a change in behavior from simply deleting spam emails to taking an active role in training the filters to improve.

Consumer Reports Finds Popular Voice Cloning Tools Lack Safeguards Δ1.69

A recent study by Consumer Reports reveals that many widely used voice cloning tools do not implement adequate safeguards to prevent potential fraud and misuse. The analysis of products from six companies indicated that only two took meaningful steps to mitigate the risk of unauthorized voice cloning, with most relying on a simple user attestation for permissions. This lack of protective measures raises significant concerns about the potential for AI voice cloning technologies to facilitate impersonation scams if not properly regulated.

Aviaton Firms Hit by Devious New Polyglot Malware Δ1.69

Aviation firms in the United Arab Emirates (UAE) were recently targeted by a highly sophisticated business email compromise (BEC) attack looking to deploy advanced malware. The attackers used a compromised email account to share polyglot files with their victims, which deployed a hidden backdoor against aviation firms. Cybersecurity researchers Proofpoint observed that these attacks started in late 2024 and target organizations with a distinct interest in aviation and satellite communications.