Advertisement · 728 × 90
#
Hashtag
#VoicePhishing
Advertisement · 728 × 90

8/ The deepfake age isn’t coming. It’s here. We’re not debating IF this happens anymore. We’re living it. Stay alert. Verify identity. Don’t trust what you see. (8/8)
#Deepfakes #VoiceCloning #AIFraud #Cybersecurity #VoicePhishing #DigitalSafety #2026 #TechTruth #CyberAlert #OnlineSecurity

0 0 0 0
One moment, please...

M-Trends 2026 reveals cyber threats split: rapid, high-impact attacks vs. persistent espionage targeting edge devices. Median dwell time rose to 14 days in 2025, with North Korean cases at 12 days. #EdgeSecurity #VoicePhishing #NorthKorea

0 0 0 0
Preview
Voice Phishing Now Second Most Common Attack Vector, Cloud Break-Ins Lead Google's M-Trends report shows voice phishing surged to become the second most common attack vector in 2025, and the leading method for cloud breaches.

Voice Phishing Now Second Most Common Attack Vector, Cloud Break-Ins Lead

#Cybersecurity #CloudSecurity #VoicePhishing #AusNews

thedailyperspective.org/article/2026-03-23-voice...

0 0 0 0
Post image

Aura Data Breach Exposes 900K Contacts
Read More: buff.ly/3Ge8kTp

#AuraBreach #Vishing #VoicePhishing #DataBreach #CustomerData #IdentityRisk #CyberIncident #InfosecNews

0 0 1 0
Preview
Aura confirms data breach exposing 900,000 marketing contacts Identity protection firm Aura disclosed that a voice phishing attack on an employee led to unauthorized access to nearly 900,000 records containing customer names and email addresses, including about 20,000 current and 15,000 former customers. Threat group ShinyHunters claimed responsibility and leaked files on their extortion site, while Aura says SSNs, passwords, and financial data were not exposed and it is investigating with external experts and law enforcement. #Aura #ShinyHunters

Aura confirms a voice phishing attack exposed nearly 900,000 marketing contacts, including 35,000 current and former customers. No SSNs, passwords, or financial data compromised. Investigation ongoing. #DataBreach #VoicePhishing #USA

0 0 0 0
Post image

Optimizely Confirms Vishing Breach
Read More: buff.ly/HbgdWBz

#Optimizely #VishingAttack #SocialEngineering #AdTechSecurity #DataBreach #VoicePhishing #CyberIncident #InfosecNews

0 0 0 0
Post image

Microsoft Teams introduces 'Report a Call' to combat voice-based scams. Users can now flag suspicious calls directly from their call history. #MicrosoftTeams #CyberSecurity #VoicePhishing Link: thedailytechfeed.com/microsoft-te...

0 0 0 0
Post image

Police Bust Thai Based Voice Phishing Ring
Read More: buff.ly/GlaSdP3

#VoicePhishing #Vishing #FinancialFraud #CyberCrime #SocialEngineering #AsiaCyber #LawEnforcement #Infosec

0 0 0 0
Preview
AI News Wrap-Up: 9th November 2025 AI-powered UK nimbyism, deepfake voice scams, Musk asks Grok about love, traders hedge bubble risk, clinics overuse algorithms. AI News.

AI News Wrap-Up: 9th November 2025

AI-powered UK nimbyism, deepfake voice scams, Musk asks Grok about love, traders hedge bubble risk, clinics overuse algorithms.

www.aiassistantstore.com/blogs/latest...

#AI #AINews #VoicePhishing #DeepfakeAudio #xAI #AIBubble #HealthcareAI

2 0 0 0
Post image

Legitime Plattformen werden zunehmend von Cyberkriminellen missbraucht

#Cybersicherheit @KnowBe4 #Malware #Phishing #ScatteredSpider #SecurityAwareness #ThreatIntelligence #VoicePhishing

netzpalaver.de/2025/...

0 0 0 0
Preview
Korean AI Startups Step in After Cambodia Voice-Phishing Crisis — But Policy Catch-Up Is Slow - KoreaTechDesk | Korean Startup and Technology News The Cambodia voice-phishing incident pushes Korean AI startups to the frontlines of cyber defense — highlighting critical policy gaps and tech potential.

After the Cambodia voice-phishing crisis, Korean startups like DeepBrain AI built tools to detect “deep voices.”

Yet slow adoption and funding gaps keep them from going nationwide.

#AISecurity #VoicePhishing #DeepBrainAI #Cybercrime
koreatechdesk.com/korea-ai-sta...

1 0 0 0
Preview
South Korean Job Scams Promise $8,900 Monthly, Deliver Forced Labor for Phishing Deceptive online advertisements promising high-paying overseas jobs are continuing to proliferate across South Korean social media platforms, luring young job

South Korean Job Scams Promise $8,900 Monthly, Deliver Forced Labor for Phishing

#humantrafficking #overseasjobscams #SouthKorea #SoutheastAsia #voicephishing

0 0 0 0
Preview
Corporate Extortion and the Fall of BreachForums: Tracking ShinyHunters Corporate Extortion and the Fall of BreachForums: Tracking ShinyHunters In this episode of "Upwardly Mobile," we dive into the world of high-stakes corporate extortion, focusing on the sophisticated cybercriminal group ShinyHunters (also tracked as UNC6040) and the subsequent takedown of their infamous platform, BreachForums. The sources detail how the FBI, in collaboration with French law enforcement authorities, seized the Breachforums.hn domain, which the Scattered Lapsus$ Hunters (a gang linked to ShinyHunters, Scattered Spider, and Lapsus$) were using as a data leak and extortion site. This action involved switching the domain’s nameservers to ns1.fbi.seized.gov and ns2.fbi.seized.gov. ShinyHunters confirmed the seizure, noting that law enforcement gained access to BreachForums database backups dating back to 2023 and escrow databases since the latest reboot, effectively declaring that "the era of forums is over". Despite the clearnet site takedown, the threat actors maintained that their Tor dark web site was still accessible and that the seizure would not affect their campaign. The Massive Salesforce Extortion Campaign The core focus of the Scattered Lapsus$ Hunters’ recent activity was an extensive Salesforce extortion campaign. This campaign originated in May 2025 when ShinyHunters launched a social engineering campaign using voice phishing to trick targets into connecting a malicious app to their organization’s Salesforce portal. The hackers claimed to have stolen more than one billion records containing customer information. The long list of affected companies included major corporations such as FedEx, Disney/Hulu, Home Depot, Marriott, Google, Cisco, Toyota, Gap, McDonald's, Walgreens, and Chanel. Salesforce has publicly stated that they will not engage, negotiate with, or pay any extortion demand. Beyond Salesforce: Discord and Red Hat The criminal group also claimed responsibility for other significant intrusions: - https://www.bleepingcomputer.com/news/security/red-hat-confirms-security-incident-after-hackers-breach-gitlab-instance/: The Scattered Lapsus$ Hunters took credit for compromising a Red Hat GitLab server, stealing more than 28,000 Git code repositories and sensitive internal documents, including customer secrets and infrastructure details. - https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service: ShinyHunters claimed responsibility for an incident affecting Discord users. Discord confirmed that an unauthorized party compromised a third-party customer service provider (5CA), impacting a limited number of users who had contacted Customer Support or Trust & Safety teams. Critically, the unauthorized party gained access to a small number of government-ID images submitted for age verification appeals, as well as usernames, emails, limited billing info, and IP addresses. Tactics and Targets The group employs sophisticated tactics, including exploiting zero-day vulnerabilities, such as a critical flaw in Oracle’s E-Business Suite software (CVE-2025-61882). Furthermore, members of the group have been known to distribute malware—specifically the commercially available ASYNCRAT backdoor—disguised as a Windows screensaver file (.scr) via menacing, targeted emails. This highlights the constant pressure faced by security professionals, often from threat actors derisively called "Advanced Persistent Teenagers" (APTs). Links & Resources - Law Enforcement Takedown: Nameservers used in the FBI seizure: ns1.fbi.seized.gov and ns2.fbi.seized.gov. - Publications Cited: https://www.bleepingcomputer.com/news/security/fbi-takes-down-breachforums-portal-used-for-salesforce-extortion/. - Discord Security Incident: Discord confirmed they would contact impacted users via noreply@discord.com. - Security Validation: Join the Picus BAS Summit to experience the future of security validation. - ASYNCRAT Analysis: Virustotal analysis on the ASYNCRAT malware provided via link. 🛡️ Sponsor: https://approov.io/ To ensure your mobile and web applications are secure against sophisticated attacks, trust the experts. Learn more about enhanced security measures and API protection at approov.io. Keywords ShinyHunters, BreachForums, Salesforce Extortion, FBI Takedown, Scattered Lapsus$ Hunters, Data Breach, Red Hat, Discord Hack, Voice Phishing, Cybercrime, Hacking Forum, ASYNCRAT, UNC6040, CVE-2025-61882, Security Validation. Relevant 

📣 New Podcast! "Corporate Extortion and the Fall of BreachForums: Tracking ShinyHunters" on @Spreaker #breachforums #cybersecurity #discord #fbi #hackerforum #redhat #salesforce #shinyhunters #voicephishing

0 0 0 0
Post image

KI-Vishing - Wenn eine bekannte Stimme zum Sicherheitsrisiko wird

#Authentifizierung #Identität #künstlicheIntelligenz @outpost24 #SocialEngineering @Specops #Vishing #VoicePhishing

netzpalaver.de/2025/...

0 0 0 0
Post image

🔎 ShinyHunters taunts NSA, demands from Google via Telegram

ShinyHunters sent Google an extortion demand on Telegram and taunted the NSA’s ability to trace them, claiming their AI-generated voices and stable frequencies foil triangulation.

#ransomNews #Extortion #VoicePhishing

4 0 0 0
Preview
سامسونج تطلق ميزة تنبيه مكالمات الاحتيال الصوتي في One UI 8 لمكافحة الخداع بالذكاء الاصطناعي أعلنت شركة سامسونج عن ابتكار أمني متقدم ضمن واجهة One UI 8 الجديدة، يستهدف التصدي لموجة الاحتيال الصوتي المتزايدة التي تستغل تقنيات الذكاء الاصطناعي ا

Samsung unveils “Voice Phishing Suspected Call Alert” in One UI 8 to warn users about AI-powered fake voice calls and prevent fraud. #Samsung #OneUI8 #Security #VoicePhishing
www.tech1new.com/2025/08/Sams...

0 0 0 0
Preview
DPRK hackers used deepfake interviews to infiltrate 320+ companies and AI agents are next. # AI Agents Are Creating the Perfect Storm for Cybersecurity The cybersecurity landscape is undergoing its most dramatic transformation in decades, with AI agents emerging as both a revolutionary prod...

coderlegion.com/4476/dprk-ha...
#CrowdStrike #BlackHatEvents #BlackHat2025 #AIAgents #AISecurity #Deepfakes #IdentityThreats #Cybersecurity #VoicePhishing #CloudSecurity #ThreatHunting #DPRK

0 0 0 0
Preview
“Even 112 Emergency Calls Can Be Intercepted by Scammers” When Mr. A suspected a voice phishing scam, he dialed 112, Korea’s police emergency hotline. He heard an automated message: “This is the 112 reporting center.”

Using a victim’s smartphone with the screen turned off, criminals could monitor the victim’s location and conversations in real time.
#voicephishing #police #emergency #call #criminal #malicioussoftware #hacking #hacker #smartphone #it #itchosun #chosun #SouthKorea #Korea #NewsUpdate

1 0 0 0
Post image

Was ist Vishing?

#Cybersecurity #Cybersicherheit #HumanFirewall #menschlicheFirewall #Phishing #Security #SecurityAwareness #Sicherheitsbewusstsein #SocialEngineering #Vishing #Voice #VoicePhishing #Zugangsdaten

netzpalaver.de/2025/...

0 0 0 0
Preview
Hackers using AI-produced audio to impersonate tax preparers, IRS Artificial Intelligence has supercharged an array of tax-season scams this year, with fraudsters using deepfake audio and other techniques to trick taxpayers into sending them money and financial docu...

Hackers are using AI-generated voices to impersonate IRS agents and tax preparers in phishing scams. Deepfake calls and emails are tricking victims into handing over financial data during tax season.
#AI #Deepfakes #Phishing #TaxScam #Cybersecurity #VoicePhishing #IRS therecord.media/hackers-use-...

1 0 0 0
Voice-Phishing: Betroffene verlieren hohe Summen | Verbraucherzentrale Niedersachsen Verbraucherzentrale Niedersachsen warnt vor Betrug

ACHTUNG #BETRUG!
#VoicePhishing - Wenn unerwünschte Anrufe richtig teuer werden können!
Kriminelle geben sich als Mitarbeitende eines Mobilfunkanbieters aus und fragen nach personenbezogenen Daten, PIN oder TAN.
Niemals solche Daten nennen!
☝️
www.verbraucherzentrale-niedersachsen.de/presse/voice...

5 5 0 0
Weißes Telekom-T auf einem Magenta Farben Quadrat. Darunter:

Aktuell versuchen Dritte Sie per Anruf über eine Geschichte wie bspw.: "Hier spricht das Telekom Sicherheitsteam..." in ein Gespräch zu verwickeln, um so Ihr Vertrauen zu gewinnen.

Dabei schicken Sie unter Umständen einen SMS-Code an Ihr Handy und bitten um entsprechende Durchgabe. Das lässt es seriös wirken und dann werden weitere persönliche Daten abgefragt. Diese Anrufe sind nicht von uns!

Weißes Telekom-T auf einem Magenta Farben Quadrat. Darunter: Aktuell versuchen Dritte Sie per Anruf über eine Geschichte wie bspw.: "Hier spricht das Telekom Sicherheitsteam..." in ein Gespräch zu verwickeln, um so Ihr Vertrauen zu gewinnen. Dabei schicken Sie unter Umständen einen SMS-Code an Ihr Handy und bitten um entsprechende Durchgabe. Das lässt es seriös wirken und dann werden weitere persönliche Daten abgefragt. Diese Anrufe sind nicht von uns!

Die Telekom hat mich gerade vor „Voice Phising“-Versuchen gewarnt. Die Warnung gebe ich gerne weiter. Geht ja ggfls. auch über andere Telekommunikationsanbieter.

#VoicePhishing

4 5 0 0
Post image

2024: 79% of cyber intrusions were malware-free, up from 40% in 2019. Voice phishing has overtaken phishing as the top first access method. #CyberSecurity #CrowdStrike #VoicePhishing #MalwareFree #Phishing #CyberTrends #DataSecurity #ThreatDetection #TechNews

0 1 0 0
Post image

Cyberkriminelle missbrauchen Microsoft-Teams als Einfallstor mit E-Mail-Bombing und Voice-Phishing

#Cybersecurity #EMailBombing #MicrosoftTeams #Office365 #Security @Sophos #Vishing #VoicePhishing @sophos_Info

netzpalaver.de/2025/...

0 0 1 0
Preview
INTERPOL financial crime operation makes record 5,500 arrests, seizures worth over USD 400 million Joint operation investigated thousands of cyber-enabled scams on five continents

The five-month Operation HAECHI V (July - November 2024) targeted seven types of #cyber enabled frauds: #voicephishing, romance #scams, online #sextortion, investment fraud, illegal online #gambling, business email compromise fraud and e-commerce fraud.

3 1 0 0
Phishing-Versuche neuerdings auch über Telefon | NZZ Betrüger beschränken sich nicht mehr aufs Internet, um an...

Phishing-Versuche immer häufiger über Telefon http://j.mp/Vh91VQ #VoicePhishing

0 0 0 0