Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Has Your Account Been Compromised? Five Cyber Smart Tips Everyone Can Use

Your Security

Has Your Account Been Compromised? Five Cyber Smart Tips Everyone Can Use

The transition to living life through our devices has become very real for scores of people and businesses. By now, the coronavirus has changed our lives in ways we never expected. This transition includes doing most things from home. Unfortunately, adapting to online life also gives bad actor’s a cornucopia of targets to exploit. There are proactive steps to take when you suspect an account may be compromised, including ways to help keep it from happening to begin with. READ FULL STORY

Account Hijacking – Keep Yours From Cyberthieves

Your Security

Account Hijacking – Keep Yours From Cyberthieves

Apple Sounds Alarm to Update for 800 Million Users

Mobile Security

Apple Sounds Alarm to Update for 800 Million Users

Watch For This Credential Stealing Scam on X

Scams & Phishing

Watch For This Credential Stealing Scam on X

Third Party Data Breach Exposes Sensitive Information of Banking Customers

Identity Theft

Third Party Data Breach Exposes Sensitive Information of Banking Customers

January 25, 2026

Wall Street is scrambling after hackers infiltrated SitusAMC, a New York-based real estate data firm serving over 1,500 financial institutions. The cyberattack has potentially exposed sensitive customer data from major banks including JPMorgan Chase, Citigroup, and Morgan Stanley. Customers of major financial institutions that use SitusAMC for mortgage payment processing may be at risk. The breach could expose personally identifiable information, financial account details, and legal documents. READ FULL STORY

Man vs. Woman: Romance Scams And Finding Love Online

Scams & Phishing

Man vs. Woman: Romance Scams And Finding Love Online

In our hi-tech world today, finding love online can be challenging. Sadly, romance scams not only break hearts, but they also break bank accounts. Research finds surprising differences between how men and women begin and end up after romance scams. The results might just surprise you. Barclays monitors their romance scam insurance claims, including how men and women differ. Barclays monitors romance scam claims. It found that even as the world gets wiser about romance scams, the scammers aren’t slowing down. READ FULL STORY

Phishing Scams Exploit Pricey Auto-Subscription Fears

Scams & Phishing

Phishing Scams Exploit Pricey Auto-Subscription Fears

With email among the top productivity tools in our everyday lives, we know cybercriminals have adopted it for their benefit, too. And now, according to an alert by the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA), there’s a new and highly lucrative email phishing campaign making the rounds. Both agencies are sounding the alarm about a particular version of this phish, wanting the public to know how it works. READ FULL STORY

Simple Habits That Make You a Tougher Target for Cybercrooks

Your Security

Simple Habits That Make You a Tougher Target for Cybercrooks

It’s already well into the new year and a fresh year usually brings fresh goals—exercise more, spend less, maybe try a new hobby. But one resolution that deserves a permanent spot on everyone’s list is tightening up your personal cybersecurity. Cyberthreats don’t take holidays, and scammers aren’t slowing down. In fact, they’re getting bolder, trickier, and faster at finding new ways to get into your accounts and steal your money or data. READ FULL STORY

FBI Warns Medusa is Trying to Snake Her Way Into Your Network

Your Security

FBI Warns Medusa is Trying to Snake Her Way Into Your Network

January 21, 2026

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) recently issued a warning about a ransomware-as-a-service variant that has been on the attack since December. The Medusa ransomware, a sophisticated cyber threat that has targeted over 300 victims across critical infrastructure sectors. These include, healthcare, education, and manufacturing. The group employs tactics such as phishing campaigns and exploiting unpatched software vulnerabilities to gain unauthorized access to systems. READ FULL STORY

Is Your Computer Hacked? The Clues and Tips You Should Know

Your Security

Is Your Computer Hacked? The Clues and Tips You Should Know

Wondering if your computer might be a hacking victim is an uneasy feeling at best. The signs and symptoms are there, and you need to know what they are and what to do about them. It’s a kind of one-two punch to hackers from you and your device. But there are clues that help you decide if someone other than you has had access to your computer. Treating a hacked computer begins with preventing one in the first place. It takes a promise to use cyber-smarts daily, and bolstering your device with security software. READ FULL STORY

A Scammer Can Wreak Havoc With Your Online Banking Account Number

Your Security

A Scammer Can Wreak Havoc With Your Online Banking Account Number

Most people know to protect their Social Security number, debit card PIN, or online banking password. But many don’t realize that something far more ordinary—your bank account number—can also be a goldmine for scammers. It may not seem sensitive at first glance (after all, it’s printed on every check), but in the wrong hands, it can lead to serious financial trouble. While banks often catch suspicious activity, scammers know that many people don’t check their accounts daily, giving them time to slip transactions through. READ FULL STORY

FBI Warns: Cybercrime Groups Exploit Salesforce to Steal Data

Corporate Security

FBI Warns: Cybercrime Groups Exploit Salesforce to Steal Data

The FBI is warning businesses about two cybercrime groups, UNC6040 and UNC6395, actively targeting Salesforce instances. Using tactics like vishing calls, fake IT support scams, and stolen OAuth tokens, attackers are stealing sensitive data and threatening extortion. The criminals are exploiting both employees and third-party integrations--each using a different method for doing so. One using social engineering and the next being by using compromised OAuth tokens. READ FULL STORY

Social Media Brings Out The Worst Scammers

Scams & Phishing

Social Media Brings Out The Worst Scammers

This Cunning Account Takeover Robbed A “Cybersmart” User’s Account

Scams & Phishing

This Cunning Account Takeover Robbed A “Cybersmart” User’s Account

 The Truth About Temu Shopping App Gives Reasons To Delete It

Your Security

The Truth About Temu Shopping App Gives Reasons To Delete It

High-Level Execs Prime Targets For Whaling Attacks

Corporate Security

High-Level Execs Prime Targets For Whaling Attacks

Why settle for minnows when whales make much bigger, better targets? That’s a question hackers might ask themselves when determining their next victim. With no shortage of information available online about C-Suite and other high-level executives, they make lucrative email phishing targets. These execs are known as “whales” and bad actors love reeling them in because it pays big time. Because these execs can make large wire transfers happen, among other things, they have become a gold standard for phishing, fraud, and profits. READ FULL STORY

IC3 Issues Alert About a Cybercrime Group Recruiting Kids

Your Security

IC3 Issues Alert About a Cybercrime Group Recruiting Kids

The FBI's IC3 has just sounded the alarm about a growing online criminal network called The Com (short for "The Community") and it's not your average hacker crew. This sprawling, international ecosystem includes thousands of members, many of them minors who are wrapped up in cybercrime, extortion, swatting, SIM swapping, ransomware, and even child sexual abuse content. What’s worse? They recruit young people, some as young as 11 through gaming sites and social media. READ FULL STORY

How Cybercriminals Are Outsmarting Us These Days

Scams & Phishing

How Cybercriminals Are Outsmarting Us These Days

Phishing isn’t new, but it’s evolving faster than ever, and if you’re not paying attention, you could be the next victim. These scams trick you into handing over personal information—logins, financial details, or even access to your entire business network by impersonating trusted sources. Whether through email, text, or cleverly crafted websites, cybercriminals are always one step ahead, looking for new ways to exploit unsuspecting users. READ FULL STORY

Hackers Drive Off With Data of 2.9 Million Hyundai, Kia, and Genesis Customers

Identity Theft

Hackers Drive Off With Data of 2.9 Million Hyundai, Kia, and Genesis Customers

If you own a Hyundai, Kia, or Genesis vehicle, your personal information may have been driven off with cybercriminals earlier this year. Hyundai AutoEver America (HAEA), the automaker’s IT services subsidiary, has confirmed a massive data breach potentially affecting up to 2.7 million customers. The exposed data includes Social Security numbers and driver’s license information—information that puts victims at high risk for identity theft. READ FULL STORY

Unlocking the Mystery of VPN’s: Why You Need One

Education

Unlocking the Mystery of VPN’s: Why You Need One

You may have heard about VPN’s (Virtual Private Network) more often lately, even popping up in TV ads for VPN service providers. What’s behind the sudden surge of VPN’s and why would you want or need one? For those who use WiFi internet connections at home or work, for shopping, banking, or just plain fun, VPN’s provide a layer of security that WiFi cannot. Although free public WiFi is found most everywhere, it’s long been a favorite for hackers because there is virtually no online security offered when using it. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...