Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

online scams

  • Home
  • online scams
From Graham Cluley – Smashing Security podcast #411: The fall of Troy, and whisky barrel scammers
Posted inArticles

From Graham Cluley – Smashing Security podcast #411: The fall of Troy, and whisky barrel scammers

Renowned cybersecurity expert Troy Hunt falls victim to a phishing attack, resulting in the exposure of thousands of subscriber details, and don't lose your life savings in a whisky scam...…
Posted by Samir K April 3, 2025
Smashing Security – The fall of Troy, and whisky barrel scammers
Posted inPodcast

Smashing Security – The fall of Troy, and whisky barrel scammers

​Renowned cybersecurity expert Troy Hunt falls victim to a phishing attack, resulting in the exposure of thousands of subscriber details, and don't lose your life savings in a whisky scam...All…
Posted by Samir K April 3, 2025
From Schneier on Security – The Combined Cipher Machine
Posted inArticles

From Schneier on Security – The Combined Cipher Machine

 Interesting article—with photos!—of the US/UK “Combined Cipher Machine” from WWII. Read More    
Posted by shaikh Saqib March 6, 2025
Smashing Security – HP’s hold music, and human trafficking
Posted inPodcast

Smashing Security – HP’s hold music, and human trafficking

​Journey with us to Myanmar's shadowy scam factories, where trafficked workers are forced to run romance-baiting and fake tech support scams, and find out why a company's mandatory hold time…
Posted by Samir K March 6, 2025
From Cyber Security News – Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
Posted inNews

From Cyber Security News – Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment

 A sophisticated cyber threat has emerged in recent weeks, targeting unsuspecting users with fake Outlook troubleshooting calls. These calls, designed to appear legitimate, ultimately lead to the deployment of ransomware…
Posted by shaikh Saqib February 17, 2025

Latest Posts

  • From Security Week – Worries About AI’s Risks to Humanity Loom Over the Trial Pitting Musk Against OpenAI’s LeadersMay 8, 2026
  • From The Hacker News – Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level AccessMay 7, 2026
  • From The Hacker News – PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud SystemsMay 7, 2026
  • From Dark Reading – Has CISA Finally Found Its New Leader in Tom Parker?May 7, 2026
  • From Cyber Security News – New Ivanti EPMM 0-Day Vulnerability Actively Exploited in AttacksMay 7, 2026
Total Visitors
1495567

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top