Still think this is not a big deal? Your information will be used to make purchases, commit crimes, request new credit cards, provide medical care to others, and more.
All the charges are in your name. And you have to prove it wasn't you! It isn't easy. The criminals have so much information about you, and they have much more experience in it than you do.
Every online action puts your information at risk.Protect your business
Industry Specific Cyber Solutions
What is happening in cyber
Last week we looked at phishing and some of its variants. This week we continue with more elaborate variants and the messages that may be used. The more you know the safer you may be.
Credential stuffing is a technique that tries a compromised password on many other sites. It works because people use the same password for multiple sites. In this case a user did it and caused over the confidential information including health and ancestry of 7 million people to be leaked.
WordPress has been exploited by cybercriminals many times. Now they used a fake alert message telling users to install a patch to prevent a remote code execution vulnerability from being exploited. But the patch is fake and installs a backdoor.
We'd love to hear from you