Tag: fraud
-
The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms
Refund fraud is now a business, with methods and tutorials sold to exploit return policies for profit. Flare shows how fraudsters turn refunds and chargebacks into a repeatable profit model. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/the-refund-fraud-economy-exploiting-major-retailers-and-payment-platforms/
-
Cybersecurity and privacy priorities for 2026: The legal risk map
Tags: attack, authentication, awareness, best-practice, breach, communications, country, cyber, cybersecurity, data, defense, finance, fraud, governance, government, incident, incident response, infrastructure, law, mfa, monitoring, privacy, ransomware, regulation, risk, risk-management, service, strategy, supply-chain, threat, usaContinued federal interest in cybersecurity and privacy, especially in connection with national security concerns: The evident connection between cybersecurity and privacy and national security have led to a number of federal initiatives in recent years. Most recently in March 2026, the White House announced the current administration’s Cyber Strategy for America, renewing a commitment to…
-
RSAC 2026 Innovation Sandbox – Charm Security: AI Anti-Fraud Platform for New Types of Fraud
Company Profile Charm Security (hereinafter referred to as Charm) is an innovative security company focused on preventing and solving fraud and deception using Agentic AI technology. Founded in January 2025, the company has set up offices in Tel Aviv, Israel and New York, USA. With a core focus on financial security, it has become an…The…
-
Global fraud losses climb to $442 billion
Online fraud is reaching more victims and generating larger losses, driven by digital tools and organized networks operating across borders. Global trends in financial fraud … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/18/online-fraud-victims-losses-interpol-report/
-
ClickFix Attack Targets Devs with MacSync Malware via Fake Claude Tools
Cybersecurity researchers at 7AI have revealed a new Claude Fraud campaign in which hackers use fake AI extensions and Google ads to steal data from tech professionals. First seen on hackread.com Jump to article: hackread.com/clickfix-attack-devs-macsync-malware-fake-claude-tools/
-
Professionelle Ansprache, gefälschte Screenshots: So läuft Kleinanzeigen-Betrug heute ab
Tags: fraudFirst seen on t3n.de Jump to article: t3n.de/news/professionelle-ansprache-gefaelschte-screenshots-so-laeuft-kleinanzeigen-betrug-heute-ab-1733796/
-
Why Enterprise Resource Planning Access Gaps Fuel Fraud Risk
Pathlock’s Jason Gzym on ERP Platforms, Observability and Fraud Exposure. Organizations believe their identity governance programs cover critical business systems. Jason Gzym, vice president of sales engineering and advisory at Pathlock, says ERP platforms remain a blind spot because teams lack granular visibility into access, activity and risky entitlement combinations. First seen on govinfosecurity.com Jump…
-
Fake-App stiehlt Einmalpasswörter und Krypto-Wallets: So schützt du dich vor dem Google-Betrug
First seen on t3n.de Jump to article: t3n.de/news/fake-app-einmalpasswoerter-google-1732410/
-
DPRK IT Worker Fraud: Hiring an Insider Threat
Nisos DPRK IT Worker Fraud: Hiring an Insider Threat Here at Nisos, we’ve spent years helping organizations understand and mitigate complex, human risk-related threats, such as insider risk, executive protection and employment fraud… First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/dprk-it-worker-fraud-hiring-an-insider-threat/
-
AI finally delivers those elusive productivity gains… for cybercriminals
Interpol says fraud schemes using the tech are 4.5x more profitable First seen on theregister.com Jump to article: www.theregister.com/2026/03/16/interpol_ai_fraud/
-
Washington is right: Cybercrime is organized crime. Now we need to shut down the business model
The executive order finally calls cyber-enabled fraud what it is: transnational organized crime. Now the U.S. has to act like it”, and the private sector has to stop settling for defense-only while the criminal infrastructure stays intact. First seen on cyberscoop.com Jump to article: cyberscoop.com/executive-order-cyber-enabled-fraud-transnational-criminal-organizations/
-
Fake rooms, props and a script to lure victims: inside an abandoned Cambodia scam centre
Sprawling compound, including mock-up banks and police offices, uncovered by Thai military during border clashesIt is as if you have walked into a branch of one of Vietnam’s banks. A row of customer service desks, divided by plastic screens, with landline phones, promotional leaflets and staff business cards. A seated waiting area and a private…
-
INTERPOL Operation Synergia III Shuts Down 45,000 Malicious IPs, 94 Arrested
INTERPOL’s Operation Synergia III led to 94 arrests and the takedown of 45,000 malicious IPs in 72 countries targeting phishing, malware, and fraud networks. First seen on hackread.com Jump to article: hackread.com/interpol-operation-synergia-iii-malicious-ip-94-arrest/
-
ISMG Editors: Iran Conflict Expands Into Cyber Warfare
Also: the Pentagon-Anthropic AI Legal Showdown, the New Reality of Document Fraud. In this week’s panel, four ISMG editors discuss the cyber activity tied to the U.S.-Israel-Iran conflict, the Pentagon’s standoff with AI firm Anthropic and a new report that reveals how document fraud reflects deeper weaknesses in verification systems. First seen on govinfosecurity.com Jump…
-
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
The excitement around Cisco’s latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked risks. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/fake-pocs-risks-cisco-sd-wan
-
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
The excitement around Cisco’s latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked risks. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/fake-pocs-risks-cisco-sd-wan
-
Authorities dismantle SocksEscort proxy network behind millions in fraud
SocksEscort, a residential proxy network used to exploit thousands of compromised home routers worldwide and facilitate large-scale fraud that cost victims millions of … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/13/socksescort-fraud-proxy-network-takedown/
-
Operation Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud
International cops stuck down 23 servers in 7 countries First seen on theregister.com Jump to article: www.theregister.com/2026/03/12/socksescort_fraud_proxy_taken_down_fbi/
-
Feds Takes Down SocksEscort Proxy Network Used in Global Fraud Schemes
European and US agencies dismantled the SocksEscort proxy network built on infected routers and used by cybercriminals in global fraud schemes. First seen on hackread.com Jump to article: hackread.com/feds-dismantle-socksescort-proxy-network-fraud/
-
Operating Lightning takes down SocksEscort proxy network blamed for tens of millions in fraud
International cops stuck down 23 servers in 7 countries First seen on theregister.com Jump to article: www.theregister.com/2026/03/12/socksescort_fraud_proxy_taken_down_fbi/
-
Meta Rolls Out New Scam Alerts Across Facebook, WhatsApp, and Messenger
Meta is rolling out new scam alerts across Facebook, WhatsApp, and Messenger as it ramps up AI-driven fraud detection and advertiser verification. The post Meta Rolls Out New Scam Alerts Across Facebook, WhatsApp, and Messenger appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-meta-ai-scam-detection-facebook-messenger-whatsapp/
-
The Rise of Agentic Fraud: How AI Agents Are Reshaping Security
What is agentic fraud? Learn how AI agents create new attack vectors”, from delegated logins to session manipulation”, and how to protect your business. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-rise-of-agentic-fraud-how-ai-agents-are-reshaping-security/
-
Euro1 million online fraud scheme uncovered, three suspects arrested
A criminal group suspected of running an online fraud scheme in Germany, which defrauded victims of around Euro1 million, has been dismantled through judicial cooperation … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/12/eurojust-online-fraud-scheme-phishing-germany/
-
North Korean fake IT worker tradecraft exposed
Opportunistic and broadly targeted: These suspect code silos were abused in a variety of illicit projects split between targeting job-seeking programmers and fake IT worker operations.”Based on our visibility, malware operations targeting individual developers seeking employment are most common,” Oliver Smith, senior threat intelligence engineer at GitLab, told CSO. “Threat actors appear to have a…
-
North Korean fake IT worker tradecraft exposed
Opportunistic and broadly targeted: These suspect code silos were abused in a variety of illicit projects split between targeting job-seeking programmers and fake IT worker operations.”Based on our visibility, malware operations targeting individual developers seeking employment are most common,” Oliver Smith, senior threat intelligence engineer at GitLab, told CSO. “Threat actors appear to have a…
-
How US Ransomware Policy Aims to Break Global Crime Networks
Ex-FBI Leader Cynthia Kaiser on Sanctions, Ecosystem Disruption, Stronger Policies. U.S. cyber policy now treats ransomware gangs and fraud networks as transnational criminal organizations. Former FBI cyber leader Cynthia Kaiser explains how sanctions, infrastructure takedowns, and international cooperation could weaken cybercrime ecosystems and reduce attacks. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/how-us-ransomware-policy-aims-to-break-global-crime-networks-a-30976
-
If consequences matter, they should apply to vendors, too
The latest executive order pushes Washington to crack down on cyber fraud, but a different mandate eases software security accountability, leaving an inconsistent strategy that keeps the attack surface cheap to exploit. First seen on cyberscoop.com Jump to article: cyberscoop.com/washington-cybercrime-executive-order-software-security-gap/
-
Protecting OTP Magic Link Endpoints from Abuse: IP Reputation, Rate Limiting, and Suspicious IP Throttling
Learn how fraud detection, IP reputation analysis, and rate limiting protect OTP and magic link endpoints from abuse and automated attacks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/protecting-otp-magic-link-endpoints-from-abuse-ip-reputation-rate-limiting-and-suspicious-ip-throttling/
-
BeatBanker Trojan Spreads via Phishing, Deploys Crypto Miner and RAT on Targeted Devices
BeatBanker is a new Android malware campaign targeting users in Brazil, combining banking fraud, crypto”‘mining, and, in its latest wave, full device takeover via a RAT. It spreads almost entirely through phishing pages that mimic the Google Play Store and trick victims into installing weaponized APKs disguised as legitimate apps and updates. The operation starts…

