<!DOCTYPE html><html data-n-head-ssr="" lang="en-us" data-n-head="%7B%22lang%22:%7B%22ssr%22:%22en-us%22%7D%7D"><head><meta data-n-head="ssr" charset="utf-8"><meta data-n-head="ssr" name="viewport" content="width=device-width, initial-scale=1"><meta data-n-head="ssr" data-hid="description" name="description" content="News, views and insights from the Bitdefender experts"><meta data-n-head="ssr" data-hid="og:title" property="og:title" content="Consumer Insights"><meta data-n-head="ssr" data-hid="og:description" property="og:description" content="News, views and insights from the Bitdefender experts"><meta data-n-head="ssr" data-hid="og:url" property="og:url" content="https://www.bitdefender.com/en-us/blog/hotforsecurity/"><meta data-n-head="ssr" data-hid="og:image" property="og:image" content="https://download.bitdefender.com/resources/themes/draco/images/lite_v2/blog-images/image-hotforsecurity.jpg"><meta data-n-head="ssr" data-hid="og:type" property="og:type" content="website"><meta data-n-head="ssr" data-hid="og:site_name" property="og:site_name" content="Hot for Security"><meta data-n-head="ssr" data-hid="twitter:title" property="twitter:title" content="Consumer Insights"><meta data-n-head="ssr" data-hid="twitter:description" property="twitter:description" content="News, views and insights from the Bitdefender experts"><meta data-n-head="ssr" data-hid="twitter:url" property="twitter:url" content="https://www.bitdefender.com/en-us/blog/hotforsecurity/"><meta data-n-head="ssr" data-hid="twitter:image" property="twitter:image" content="https://download.bitdefender.com/resources/themes/draco/images/lite_v2/blog-images/image-hotforsecurity.jpg"><meta data-n-head="ssr" data-hid="author" name="author" content="Bitdefender"><meta data-n-head="ssr" data-hid="robots" name="robots" content="index,follow"><title>Consumer Insights</title><link data-n-head="ssr" rel="apple-touch-icon" sizes="57x57" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-57x57.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="114x114" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-114x114.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="72x72" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-72x72.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="144x144" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-144x144.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="60x60" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-60x60.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="120x120" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-120x120.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="76x76" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-76x76.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="apple-touch-icon" sizes="152x152" href="https://download.bitdefender.com/resources/images/favicon/apple-touch-icon-152x152.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="icon" sizes="196x196" href="https://download.bitdefender.com/resources/images/favicon/favicon-196x196.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="icon" sizes="96x96" href="https://download.bitdefender.com/resources/images/favicon/favicon-96x96.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="icon" sizes="32x32" href="https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" rel="icon" sizes="16x16" href="https://download.bitdefender.com/resources/images/favicon/favicon-16x16.png" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" data-hid="canonical" rel="canonical" href="https://www.bitdefender.com/en-us/blog/hotforsecurity/" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" data-hid="hreflang-en-US" rel="alternate" hreflang="en-US" href="https://www.bitdefender.com/en-us/blog/hotforsecurity/" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" data-hid="hreflang-en-GB" rel="alternate" hreflang="en-GB" href="https://www.bitdefender.com/en-gb/blog/hotforsecurity/" nonce="DhcnhD3khTMePgXW"><link data-n-head="ssr" data-hid="hreflang-en-AU" rel="alternate" hreflang="en-AU" href="https://www.bitdefender.com/en-au/blog/hotforsecurity/" nonce="DhcnhD3khTMePgXW"><link rel="stylesheet" href="/nuxt/_nuxt/css/6b42635.css" nonce="DhcnhD3khTMePgXW"><link rel="stylesheet" href="/nuxt/_nuxt/css/2bc6b32.css" nonce="DhcnhD3khTMePgXW"><link rel="stylesheet" href="/nuxt/_nuxt/css/7e582bf.css" nonce="DhcnhD3khTMePgXW"><script type="importmap" nonce="DhcnhD3khTMePgXW">{
      "imports": {
        "@repobit/dex-data-layer": "https://esm.sh/@repobit/dex-data-layer@1.6.1",
        "@repobit/dex-launch":     "https://esm.sh/@repobit/dex-launch@2.0.1",
        "@repobit/dex-target":     "https://esm.sh/@repobit/dex-target@2.2.0",
        "@repobit/dex-utils":      "https://esm.sh/@repobit/dex-utils@1.3.0",
        "@tsparticles/all":        "https://esm.sh/@tsparticles/all@3.8.1",
        "@tsparticles/engine":     "https://esm.sh/@tsparticles/engine@3.8.1"
      }
    }</script><script src="/nuxt/_nuxt/e65cf33.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/eb938ba.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/8e0803f.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/b5382a3.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/3203299.js" defer="" nonce="DhcnhD3khTMePgXW"></script><script src="/nuxt/_nuxt/737124e.js" defer="" nonce="DhcnhD3khTMePgXW"></script></head><body><div data-server-rendered="true" id="__nuxt"><!----><div id="__layout"><div><header class="tw-bg-white tw-py-5 lg:tw-bg-black lg:tw-py-4 lg:tw-pt-0"><div class="tw-container tw-flex tw-justify-between lg:tw-hidden"><a href="/" aria-label="Bitdefender" title="Bitdefender" class="tw-block tw-w-[103px] sm:tw-w-[150px] md:tw-w-[180px]"><svg xmlns="http://www.w3.org/2000/svg" width="189.789" height="27.868" viewBox="0 0 189.789 27.868" class="tw-block tw-h-full tw-w-full"><path fill="black" d="M176.528 83.716a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.146 12.146 0 0 0 4.652-.865l2.477-4.146-.328-.192a14.073 14.073 0 0 1-6.407 1.694c-3 0-5.6-1.517-5.888-4.141h13.274v-1.2c0-6.067-3.678-9.485-8.536-9.485m-4.739 7.415a4.318 4.318 0 0 1 4.5-4.146c2.724 0 4.394 1.6 4.425 4.146zm95.177-7.4a8.718 8.718 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.086 12.086 0 0 0 4.642-.865l2.487-4.146-.328-.177a14.1 14.1 0 0 1-6.412 1.694c-3 0-5.59-1.517-5.883-4.141h13.264c.575-6.836-3.093-10.688-8.536-10.688m-4.737 7.417a4.314 4.314 0 0 1 4.49-4.146c2.724 0 4.394 1.6 4.43 4.146zm-56.1-7.417a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.126 12.126 0 0 0 4.652-.865l2.477-4.146-.333-.177a14.038 14.038 0 0 1-6.4 1.694c-3 0-5.6-1.517-5.888-4.141h13.279c.575-6.836-3.1-10.688-8.546-10.688m-4.732 7.417a4.318 4.318 0 0 1 4.5-4.146c2.719 0 4.394 1.6 4.425 4.146zM116.2 88.039v-.071a5.717 5.717 0 0 0 4.46-5.632c0-4.692-3.991-6.471-7.865-6.471H99.68v.384l1.32 1.122c1.584 1.294 1.786 1.542 1.786 2.71v21.528h9.258c4.853 0 9.722-1.744 9.722-7.346a6.128 6.128 0 0 0-5.55-6.219m-8.864-8.256h3.769c2.553 0 3.34.354 4.112 1.092a2.931 2.931 0 0 1 .858 2.22 2.885 2.885 0 0 1-.883 2.149c-.757.728-1.8 1.082-3.688 1.082h-4.167zm4.208 17.888h-4.208v-7.413h4.389c3.7 0 5.439.945 5.439 3.635 0 3.382-3.269 3.782-5.62 3.782m18.83-19.45a2.8 2.8 0 1 1-2.8-2.629 2.681 2.681 0 0 1 2.825 2.619m-7.336 5.936h6.695V101.6h-4.359V87.872c0-1.441-.081-1.673-1.645-2.882l-.691-.551zm34.65-9.06l1.367.88c1.241.794 1.428 1.173 1.428 2.28v8.089h-.106a7.158 7.158 0 0 0-5.913-2.654c-4.969 0-8.42 4-8.42 9.161s3.234 9.161 8.6 9.161a6.746 6.746 0 0 0 5.989-3.034h.071l.454 2.619h3.678V74.782h-7.147zm-2.174 23a5.234 5.234 0 1 1 5.121-5.233 5.059 5.059 0 0 1-5.121 5.233m92.473-23l.605.4c2.1 1.33 2.361 1.714 2.361 3.984v6.89h-.111a7.166 7.166 0 0 0-5.913-2.654c-4.969 0-8.415 4-8.415 9.161s3.229 9.161 8.577 9.161a6.734 6.734 0 0 0 5.989-3.034h.076l.459 2.619h3.678V74.782h-7.315zm-2.018 23a5.234 5.234 0 1 1 5.116-5.233 5.059 5.059 0 0 1-5.116 5.237m43.449-14.156v4.216a8.7 8.7 0 0 0-2.1-.329 4.391 4.391 0 0 0-4.682 4.4v9.343h-4.349V88.706c0-2.194-.116-2.528-1.887-3.645l-1.095-.723v-.192h7.341v2.771h.076a5.549 5.549 0 0 1 5.151-3.2 5.715 5.715 0 0 1 1.559.253m-96.673.11h4.036v3.72H192.8v13.8h-4.369V89.3c0-1.461-.293-1.785-2.018-3.155l-2.22-1.81v-.255h4.243V80.9c0-4.737 3.083-7.746 9.752-6.411l1.009 3.7-.212.172c-3.486-1.375-6.185-.506-6.185 2.528zm41.239 6.5v11.02h-4.354v-9.709c0-1.921-.5-4.247-3.532-4.247-2.866 0-3.991 2.108-3.991 4.434v9.522h-4.349V88.7c0-2.194-.116-2.528-1.887-3.645l-1.059-.723v-.192h7.114v2.66h.071a6.742 6.742 0 0 1 5.55-3.094c4.112 0 6.483 2.821 6.483 6.866m-89.345 7.523l.141.091s-2.164 3.468-2.159 3.468c-3.532.966-7.537-.061-7.537-5.764v-7.078c0-1.127-.182-1.067-2.623-3.084l-1.579-1.37v-.207h4.228L136.8 79.1h2.76v5.056h4.657v3.7h-4.657v7.912c0 3.15 2.154 3.226 5.186 2.326" transform="translate(-99.68 -74.171)"></path></svg></a> <button aria-label="Toggle menu" class="tw-block"><span class="tw-block tw-h-[3px] tw-w-[25px] tw-bg-black data-[menu-active=true]:tw-translate-y-[8px] data-[menu-active=true]:-tw-rotate-45"></span> <span class="tw-my-[5px] tw-block tw-h-[3px] tw-w-[25px] tw-bg-black data-[menu-active=true]:tw-invisible"></span> <span class="tw-block tw-h-[3px] tw-w-[25px] tw-bg-black data-[menu-active=true]:-tw-translate-y-[8px] data-[menu-active=true]:tw-rotate-45"></span></button></div> <div class="tw-hidden tw-flex-wrap data-[menu-active=true]:tw-flex lg:tw-block lg:data-[menu-active=true]:tw-block"><div class="tw-order-last tw-w-full tw-border-[#3c3c3c] lg:tw-border-b-2"><div class="tw-container"><ul class="tw-block tw-justify-end lg:tw-flex"><li class="tw-relative"><a aria-label="Company" title="Company" href="/en-us/company/" data-link="/en-us/company/" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:-tw-left-4 before:tw-m-auto before:tw-hidden before:tw-h-4 before:tw-w-0.5 before:tw-bg-[#616161] after:tw-absolute after:tw-bottom-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-mx-4 lg:tw-border-0 lg:tw-py-3 lg:tw-text-xs lg:tw-uppercase lg:tw-tracking-widest lg:tw-text-[#dedede] lg:before:tw-block lg:hover:after:tw-scale-x-100">Company
                  </a> <!----></li><li class="tw-relative"><a aria-label="Blog" title="Blog" href="/en-us/blog/" data-link="/en-us/blog/" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:-tw-left-4 before:tw-m-auto before:tw-hidden before:tw-h-4 before:tw-w-0.5 before:tw-bg-[#616161] after:tw-absolute after:tw-bottom-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-mx-4 lg:tw-border-0 lg:tw-py-3 lg:tw-text-xs lg:tw-uppercase lg:tw-tracking-widest lg:tw-text-[#dedede] lg:before:tw-block lg:hover:after:tw-scale-x-100">Blog
                  </a> <!----></li></ul></div></div> <div class="tw-container tw-mt-5 lg:tw-mt-3.5 lg:tw-flex xl:tw-mt-5"><a href="/" aria-label="Bitdefender" title="Bitdefender" class="tw-mr-3 tw-hidden tw-h-[30px] tw-w-[180px] lg:tw-block"><svg xmlns="http://www.w3.org/2000/svg" width="189.789" height="27.868" viewBox="0 0 189.789 27.868" class="tw-block tw-h-full tw-w-full"><path fill="#fff" d="M176.528 83.716a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.146 12.146 0 0 0 4.652-.865l2.477-4.146-.328-.192a14.073 14.073 0 0 1-6.407 1.694c-3 0-5.6-1.517-5.888-4.141h13.274v-1.2c0-6.067-3.678-9.485-8.536-9.485m-4.739 7.415a4.318 4.318 0 0 1 4.5-4.146c2.724 0 4.394 1.6 4.425 4.146zm95.177-7.4a8.718 8.718 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.086 12.086 0 0 0 4.642-.865l2.487-4.146-.328-.177a14.1 14.1 0 0 1-6.412 1.694c-3 0-5.59-1.517-5.883-4.141h13.264c.575-6.836-3.093-10.688-8.536-10.688m-4.737 7.417a4.314 4.314 0 0 1 4.49-4.146c2.724 0 4.394 1.6 4.43 4.146zm-56.1-7.417a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.126 12.126 0 0 0 4.652-.865l2.477-4.146-.333-.177a14.038 14.038 0 0 1-6.4 1.694c-3 0-5.6-1.517-5.888-4.141h13.279c.575-6.836-3.1-10.688-8.546-10.688m-4.732 7.417a4.318 4.318 0 0 1 4.5-4.146c2.719 0 4.394 1.6 4.425 4.146zM116.2 88.039v-.071a5.717 5.717 0 0 0 4.46-5.632c0-4.692-3.991-6.471-7.865-6.471H99.68v.384l1.32 1.122c1.584 1.294 1.786 1.542 1.786 2.71v21.528h9.258c4.853 0 9.722-1.744 9.722-7.346a6.128 6.128 0 0 0-5.55-6.219m-8.864-8.256h3.769c2.553 0 3.34.354 4.112 1.092a2.931 2.931 0 0 1 .858 2.22 2.885 2.885 0 0 1-.883 2.149c-.757.728-1.8 1.082-3.688 1.082h-4.167zm4.208 17.888h-4.208v-7.413h4.389c3.7 0 5.439.945 5.439 3.635 0 3.382-3.269 3.782-5.62 3.782m18.83-19.45a2.8 2.8 0 1 1-2.8-2.629 2.681 2.681 0 0 1 2.825 2.619m-7.336 5.936h6.695V101.6h-4.359V87.872c0-1.441-.081-1.673-1.645-2.882l-.691-.551zm34.65-9.06l1.367.88c1.241.794 1.428 1.173 1.428 2.28v8.089h-.106a7.158 7.158 0 0 0-5.913-2.654c-4.969 0-8.42 4-8.42 9.161s3.234 9.161 8.6 9.161a6.746 6.746 0 0 0 5.989-3.034h.071l.454 2.619h3.678V74.782h-7.147zm-2.174 23a5.234 5.234 0 1 1 5.121-5.233 5.059 5.059 0 0 1-5.121 5.233m92.473-23l.605.4c2.1 1.33 2.361 1.714 2.361 3.984v6.89h-.111a7.166 7.166 0 0 0-5.913-2.654c-4.969 0-8.415 4-8.415 9.161s3.229 9.161 8.577 9.161a6.734 6.734 0 0 0 5.989-3.034h.076l.459 2.619h3.678V74.782h-7.315zm-2.018 23a5.234 5.234 0 1 1 5.116-5.233 5.059 5.059 0 0 1-5.116 5.237m43.449-14.156v4.216a8.7 8.7 0 0 0-2.1-.329 4.391 4.391 0 0 0-4.682 4.4v9.343h-4.349V88.706c0-2.194-.116-2.528-1.887-3.645l-1.095-.723v-.192h7.341v2.771h.076a5.549 5.549 0 0 1 5.151-3.2 5.715 5.715 0 0 1 1.559.253m-96.673.11h4.036v3.72H192.8v13.8h-4.369V89.3c0-1.461-.293-1.785-2.018-3.155l-2.22-1.81v-.255h4.243V80.9c0-4.737 3.083-7.746 9.752-6.411l1.009 3.7-.212.172c-3.486-1.375-6.185-.506-6.185 2.528zm41.239 6.5v11.02h-4.354v-9.709c0-1.921-.5-4.247-3.532-4.247-2.866 0-3.991 2.108-3.991 4.434v9.522h-4.349V88.7c0-2.194-.116-2.528-1.887-3.645l-1.059-.723v-.192h7.114v2.66h.071a6.742 6.742 0 0 1 5.55-3.094c4.112 0 6.483 2.821 6.483 6.866m-89.345 7.523l.141.091s-2.164 3.468-2.159 3.468c-3.532.966-7.537-.061-7.537-5.764v-7.078c0-1.127-.182-1.067-2.623-3.084l-1.579-1.37v-.207h4.228L136.8 79.1h2.76v5.056h4.657v3.7h-4.657v7.912c0 3.15 2.154 3.226 5.186 2.326" transform="translate(-99.68 -74.171)"></path></svg></a> <a href="/en-us/consumer/" onclick="s_objectID='For Home';" aria-label="For Home" title="For Home" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium after:tw-absolute after:tw-bottom-0 after:tw-left-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-border-0 lg:tw-px-5 lg:tw-pt-2 lg:tw-pb-4 lg:tw-text-[#dedede] lg:hover:after:tw-scale-x-100">For Home</a><a href="/en-us/business/" onclick="s_objectID='For Business';" aria-label="For Business" title="For Business" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium after:tw-absolute after:tw-bottom-0 after:tw-left-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-border-0 lg:tw-px-5 lg:tw-pt-2 lg:tw-pb-4 lg:tw-text-[#dedede] lg:hover:after:tw-scale-x-100">For Business</a><a href="/en-us/partners/" onclick="s_objectID='For Partners';" aria-label="For Partners" title="For Partners" class="tw-relative tw-block tw-border-b-[1px] tw-border-[#000]/[0.2] tw-py-2.5 tw-font-medium after:tw-absolute after:tw-bottom-0 after:tw-left-0 after:tw-block after:tw-h-1 after:tw-w-full after:tw-origin-right after:tw-scale-x-0 after:tw-bg-[#006eff] after:tw-transition-transform after:tw-duration-300 hover:after:tw-origin-left lg:tw-border-0 lg:tw-px-5 lg:tw-pt-2 lg:tw-pb-4 lg:tw-text-[#dedede] lg:hover:after:tw-scale-x-100">For Partners</a></div></div></header> <div><nav data-fetch-key="BlogMenu:0" class="tw-bg-black tw-py-4"><div class="tw-container tw-flex tw-space-x-7"><div class="tw-flex tw-w-6/12 tw-items-center sm:tw-w-8/12"><a href="/en-us/blog/hotforsecurity/" aria-current="page" title="Consumer Insights" class="tw-relative tw-mr-4 tw-text-center tw-text-xs tw-font-bold tw-uppercase tw-text-[#7e8b9f] after:tw-absolute after:tw-left-0 after:tw--bottom-2 after:tw-block after:tw-h-[1px] after:tw-w-0 after:tw-bg-[#7e8b9f] after:tw-transition-all after:tw-duration-300 after:tw-ease-in-out hover:after:tw-w-full sm:tw-text-left md:tw-text-sm router-link-exact-active router-link-active">Consumer Insights
            </a><a href="/en-us/blog/labs/" title="Labs" class="tw-relative tw-mr-4 tw-text-center tw-text-xs tw-font-bold tw-uppercase tw-text-[#7e8b9f] after:tw-absolute after:tw-left-0 after:tw--bottom-2 after:tw-block after:tw-h-[1px] after:tw-w-0 after:tw-bg-[#7e8b9f] after:tw-transition-all after:tw-duration-300 after:tw-ease-in-out hover:after:tw-w-full sm:tw-text-left md:tw-text-sm">Labs
            </a><a href="/en-us/blog/businessinsights/" title="Business Insights" class="tw-relative tw-mr-4 tw-text-center tw-text-xs tw-font-bold tw-uppercase tw-text-[#7e8b9f] after:tw-absolute after:tw-left-0 after:tw--bottom-2 after:tw-block after:tw-h-[1px] after:tw-w-0 after:tw-bg-[#7e8b9f] after:tw-transition-all after:tw-duration-300 after:tw-ease-in-out hover:after:tw-w-full sm:tw-text-left md:tw-text-sm">Business Insights
            </a><!----></div> <div class="tw-flex tw-w-6/12 tw-items-center tw-justify-end sm:tw-w-4/12"><a aria-label="show rss feed" title="show rss feed" href="/nuxt/api/en-us/rss/hotforsecurity/" target="_blank" class="tw-w-5 tw-text-white tw-mr-4"><svg width="20" aria-hidden="true" focusable="false" data-prefix="far" data-icon="rss-square" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512" class="svg-inline--fa fa-rss-square fa-w-14"><path fill="currentColor" d="M400 32H48C21.49 32 0 53.49 0 80v352c0 26.51 21.49 48 48 48h352c26.51 0 48-21.49 48-48V80c0-26.51-21.49-48-48-48zm-6 400H54a6 6 0 0 1-6-6V86a6 6 0 0 1 6-6h340a6 6 0 0 1 6 6v340a6 6 0 0 1-6 6zm-218-88c0 22.091-17.909 40-40 40s-40-17.909-40-40 17.909-40 40-40 40 17.909 40 40zm93.566 30.405c-4.774-88.343-75.534-159.193-163.971-163.971-5.22-.282-9.595 3.912-9.595 9.14v27.468c0 4.808 3.709 8.841 8.507 9.153 63.904 4.162 115.127 55.258 119.298 119.298.313 4.798 4.345 8.507 9.153 8.507h27.468c5.228 0 9.422-4.375 9.14-9.595zm82.428.165c-4.796-133.612-112.3-241.744-246.564-246.564-5.159-.185-9.43 3.983-9.43 9.146v27.467c0 4.929 3.906 8.94 8.83 9.142 109.245 4.479 196.93 92.181 201.408 201.408.202 4.925 4.213 8.83 9.142 8.83h27.467c5.164.001 9.332-4.27 9.147-9.429z"></path></svg></a> <button aria-label="Open bookmarks list" class="tw-relative tw-text-xl tw-mr-4"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----> <!----></button> <button aria-label="open search bar" class="tw-text-white tw-block tw-text-2xl"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58.1 59.4" width="22" overflow="visible" class="tw-w-[1em] tw-h-[1em] icon-search"><circle cx="23" cy="23" r="20.5" class="icon-search-inner"></circle> <path d="M39.5 35.2l16.1 11.7" class="icon-search-inner"></path></svg></button> <!----></div></div></nav> <div></div> <header class="header tw-relative tw-bg-black tw-bg-cover tw-bg-center tw-py-12 after:tw-absolute after:tw-left-0 after:tw-top-0 after:tw-z-10 after:tw-block after:tw-h-full after:tw-w-full after:tw-bg-gradient-to-r after:tw-from-black after:tw-via-black/[0.8] after:tw-to-black/0 after:tw-opacity-90 lg:after:tw-w-3/4 xl:tw-pt-0" style="--bg-image-xl:url('https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w2000/2026/05/16oriz-EN.png');--bg-image-l:url('https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w1000/2026/05/16oriz-EN.png');--bg-image-m:url('https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/16oriz-EN.png');--bg-image-s:url('https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/05/16oriz-EN.png');" data-v-0e4cfc3c=""><div class="tw-container tw-relative tw-z-20 tw-text-white xl:tw-py-12" data-v-0e4cfc3c=""><div class="tw-my-6 tw-w-full md:tw-w-10/12 lg:tw-w-7/12" data-v-0e4cfc3c=""><!----> <h1 class="tw-mb-4 tw-text-xl tw-font-bold" data-v-0e4cfc3c="">Consumer Insights</h1> <div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/safe-nomad" title="The Safe Nomad" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">The Safe Nomad
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/world-password-day-2026" title="World Password Day: Be honest… how are you really handling your passwords?" class="tw-block" data-v-0e4cfc3c=""><h2 class="md:tYeahw-text-3xl tw-text-2xl tw-font-bold md:tw-leading-snug lg:tw-text-4xl lg:tw-leading-snug xl:tw-text-5xl xl:tw-leading-tight" data-v-0e4cfc3c="">
               World Password Day: Be honest… how are you really handling your passwords?
            </h2></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#41485e;">
         May 06, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             4 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div> <h3 class="tw-relative tw-mt-12 tw-mb-6 tw-inline-block tw-pr-6 tw-text-lg tw-text-[#41485e] after:tw-absolute after:tw--right-24 after:tw-top-0 after:tw-bottom-0 after:tw-m-auto after:tw-block after:tw-h-2.5 after:tw-w-24 after:tw-bg-current" data-v-0e4cfc3c="">Top Stories</h3> <div class="tw-mb-4 last:tw-mb-0" data-v-0e4cfc3c=""><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/family" title="Family Safety" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Family Safety
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/set-up-parent-managed-whatsapp-account-child" title="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" class="tw-block tw-text-lg tw-font-bold" data-v-0e4cfc3c="">Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child</a></div><div class="tw-mb-4 last:tw-mb-0" data-v-0e4cfc3c=""><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/tag/threats" title="Threats" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Threats
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/f1-returns-risks-of-free-streaming" title="As F1 Returns, So Do the Risks of Free Streaming" class="tw-block tw-text-lg tw-font-bold" data-v-0e4cfc3c="">As F1 Returns, So Do the Risks of Free Streaming</a></div><div class="tw-mb-4 last:tw-mb-0" data-v-0e4cfc3c=""><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;" data-v-0e4cfc3c=""><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><a href="/en-us/blog/hotforsecurity/tag/alert" title="alert" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">alert
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/israel-iran-crisis-scams" title="War as a Hook: How Fraudsters Are Using the Israel-Iran Crisis to Target Netizens" class="tw-block tw-text-lg tw-font-bold" data-v-0e4cfc3c="">War as a Hook: How Fraudsters Are Using the Israel-Iran Crisis to Target Netizens</a></div></div></div></header> <section class="tw-overflow-hidden tw-bg-[#eff0f1] tw-py-12"><div class="tw-container tw-mb-6 tw-flex tw-w-full tw-flex-wrap"><div class="tw-w-1/2"><h2><span class="tw-block tw-text-sm tw-font-medium tw-uppercase lg:tw-text-sm" style="color:#696969;">
      latest
   </span> <span class="tw-block tw-text-xl tw-font-bold tw-uppercase lg:tw-text-2xl tw-text-black">
      Industry News
   </span></h2></div> <div class="tw-w-1/2 tw-text-right"><a href="/en-us/blog/hotforsecurity/tag/industry-news" class="tw-inline-block tw-cursor-pointer tw-border tw-border-[#d4d7d9] tw-bg-white tw-p-4 tw-text-sm tw-font-bold tw-text-[#265fc9] hover:tw-bg-[#d4d7d9] sm:tw-py-4 sm:tw-px-10">View all posts</a></div></div> <div class="tw-container md:tw-flex md:tw-space-x-7"><div class="tw-mb-4 tw-w-full md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block"><a href="/en-us/blog/hotforsecurity/man-films-woman-smart-glasses-money" title="New fear: Man films woman with smart glasses, seeks money to take video down" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="New fear: Man films woman with smart glasses, seeks money to take video down" title="New fear: Man films woman with smart glasses, seeks money to take video down" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/ChatGPT-Image-May-8--2026--05_27_52-PM.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#0065EB;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/man-films-woman-smart-glasses-money" title="New fear: Man films woman with smart glasses, seeks money to take video down" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>New fear: Man films woman with smart glasses, seeks money to take video down</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/sstahie" title="Silviu STAHIE" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Silviu STAHIE" title="Silviu STAHIE" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w100/2026/03/BD_Silviu_Stahie_Pic3-1.jpeg" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/sstahie" title="Silviu STAHIE" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Silviu STAHIE
         </a></div> <p style="color:#6B6B6B;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div class="tw-mb-4 tw-w-full md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block"><a href="/en-us/blog/hotforsecurity/clickfix-compromised-wordpress-sites-vidar-stealer-australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/clickfix-vidar-stealer-australia-header.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#0065EB;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/very-small-business" title="Very Small Business" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Very Small Business
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/clickfix-compromised-wordpress-sites-vidar-stealer-australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Filip TRUȚĂ" title="Filip TRUȚĂ" data-src="https://0.gravatar.com/avatar/377aeee1f02a7ae7ac62f20f2f4ce504?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Filip TRUȚĂ
         </a></div> <p style="color:#6B6B6B;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div class="tw-mb-4 tw-w-full md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block"><a href="/en-us/blog/hotforsecurity/inside-department-4-russias-secret-school-for-hackers" title="Inside Department 4: Russia's secret school for hackers" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Inside Department 4: Russia's secret school for hackers" title="Inside Department 4: Russia's secret school for hackers" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/department-4.jpeg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#0065EB;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/inside-department-4-russias-secret-school-for-hackers" title="Inside Department 4: Russia's secret school for hackers" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Inside Department 4: Russia's secret school for hackers</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/gcluley" title="Graham CLULEY" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Graham CLULEY" title="Graham CLULEY" data-src="https://2.gravatar.com/avatar/5fdc27b8b6f6fd69e77aa017a53cceb5?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/gcluley" title="Graham CLULEY" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Graham CLULEY
         </a></div> <p style="color:#6B6B6B;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div></div></section> <section class="tw-overflow-hidden tw-bg-[#111] tw-py-12"><div class="tw-container"><div class="tw-mb-6 tw-flex tw-w-1/2 tw-items-center"><h2><span class="tw-block tw-text-sm tw-font-medium tw-uppercase lg:tw-text-sm" style="color:#969696;">
      latest
   </span> <span class="tw-block tw-text-xl tw-font-bold tw-uppercase lg:tw-text-2xl tw-text-white">
      Digital Privacy
   </span></h2></div> <div class="tw-flex-wrap tw-gap-7 md:tw-inline-flex"><div class="tw-mb-8 tw-w-full"><div class="tw-relative tw-h-[360px] tw-p-6 md:tw-h-[460px] lg:tw-h-[600px] lg:tw-p-12"><div class="tw-relative tw-z-20 tw-flex tw-h-full tw-flex-col tw-flex-wrap tw-justify-between"><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm tw-text-white"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#757575;">
         May 05, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             2 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div> <div><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/data-breach" title="Data Breach" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Data Breach
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/canvas-data-breach-2026" title="Instructure confirms breach; millions of Canvas users potentially impacted" class="tw-bold tw-max-w-md tw-overflow-hidden tw-text-2xl tw-font-bold tw-text-white tw-line-clamp-3 md:tw-text-3xl md:tw-leading-tight">Instructure confirms breach; millions of Canvas users potentially impacted</a></div></div> <div class="tw-absolute tw-left-0 tw-top-0 tw-h-full tw-w-full after:tw-absolute after:tw-left-0 after:tw-bottom-0 after:tw-z-10 after:tw-block after:tw-h-1/2 after:tw-w-full after:tw-bg-gradient-to-t after:tw-from-[#111]/[1] after:tw-via-[#111]/[0.8] after:tw-to-[#111]/[0]"><img width="500" height="500" alt="Instructure confirms breach; millions of Canvas users potentially impacted" title="Instructure confirms breach; millions of Canvas users potentially impacted" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Instructure-confirms-breach--millions-of-Canvas-users-potentially-impacted.png" class="tw-h-full tw-w-full tw-object-cover"></div></div></div> <!----><!----> <div class="tw-mb-4 tw-w-full tw-flex-1 last:tw-mb-0 md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-text-white"><a href="/en-us/blog/hotforsecurity/stalkerware-data-leak-screenshots-celebrities-exposed" title="Stalkerware data leak exposes private screenshots linked to celebrities and influencers" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Stalkerware data leak exposes private screenshots linked to celebrities and influencers" title="Stalkerware data leak exposes private screenshots linked to celebrities and influencers" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Stalkerware-data-leak-exposes-private-screenshots-linked-to-celebrities-and-influencers.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#1479FF;"><a href="/en-us/blog/hotforsecurity/tag/data-breach" title="Data Breach" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Data Breach
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/stalkerware-data-leak-screenshots-celebrities-exposed" title="Stalkerware data leak exposes private screenshots linked to celebrities and influencers" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Stalkerware data leak exposes private screenshots linked to celebrities and influencers</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#808080;">
         May 04, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><!----> <div class="tw-mb-4 tw-w-full tw-flex-1 last:tw-mb-0 md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-text-white"><a href="/en-us/blog/hotforsecurity/hackers-claim-to-have-breached-udemy" title="Hackers claim to have breached Udemy, stealing 1.4 million user records" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Hackers claim to have breached Udemy, stealing 1.4 million user records" title="Hackers claim to have breached Udemy, stealing 1.4 million user records" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/04/Hackers-claim-to-have-breached-Udemy--stealing-1.4-million-user-records--2-.jpg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#1479FF;"><a href="/en-us/blog/hotforsecurity/tag/data-breach" title="Data Breach" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Data Breach
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/hackers-claim-to-have-breached-udemy" title="Hackers claim to have breached Udemy, stealing 1.4 million user records" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Hackers claim to have breached Udemy, stealing 1.4 million user records</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#808080;">
         April 27, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             2 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><!----> <div class="tw-mb-4 tw-w-full tw-flex-1 last:tw-mb-0 md:tw-mb-12 md:tw-w-1/3"><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-text-white"><a href="/en-us/blog/hotforsecurity/rituals-cosmetics-data-breach-2026" title="Rituals data breach exposes customer details" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Rituals data breach exposes customer details" title="Rituals data breach exposes customer details" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/04/Rituals-data-breach-exposes-customer-details.jpg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#1479FF;"><a href="/en-us/blog/hotforsecurity/tag/data-breach" title="Data Breach" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Data Breach
      </a><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/rituals-cosmetics-data-breach-2026" title="Rituals data breach exposes customer details" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Rituals data breach exposes customer details</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#808080;">
         April 23, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div></div></div></section> <section data-fetch-key="FilterSection:0" class="tw-container tw-flex tw-flex-wrap tw-py-8 lg:tw-flex-nowrap lg:tw-space-x-7"><div class="tw-order-last tw-mb-12 tw-w-full md:tw-mb-0 lg:tw-order-first lg:tw-w-2/3"><div class="tw-mb-7 tw-flex tw-h-20 tw-items-center tw-border-b tw-border-[#e1e3e5] tw-text-xs tw-font-bold sm:tw-text-sm md:tw-text-base"><h2 data-button-active="true" class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               All
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               Threats
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               Product Updates
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               Smart Home
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               Tips and Tricks
            </h2><h2 class="tw-mr-5 tw-cursor-pointer tw-uppercase tw-text-[#595959] last:tw-mr-0 data-[button-active=true]:tw-text-black">
               VPN
            </h2></div> <div class="tw-grid-cols-2 tw-gap-7 md:tw-grid"><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/fbi-warning-bank-spoofing-calls-drain-accounts" title="FBI warns of rising bank spoofing calls as scam callers drain accounts and nearly fool ABC7 anchor" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="FBI warns of rising bank spoofing calls as scam callers drain accounts and nearly fool ABC7 anchor" title="FBI warns of rising bank spoofing calls as scam callers drain accounts and nearly fool ABC7 anchor" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/FBI-warns-of-rising-bank-spoofing-calls-as-scam-callers-drain-accounts-and-nearly-fool-ABC7-anchor.jpg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/fbi-warning-bank-spoofing-calls-drain-accounts" title="FBI warns of rising bank spoofing calls as scam callers drain accounts and nearly fool ABC7 anchor" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>FBI warns of rising bank spoofing calls as scam callers drain accounts and nearly fool ABC7 anchor</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Alina BÎZGĂ" title="Alina BÎZGĂ" data-src="https://2.gravatar.com/avatar/8438d6e3076d0baf471aec1235424fcf?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/abizga" title="Alina BÎZGĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Alina BÎZGĂ
         </a></div> <p style="color:#757575;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             4 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/man-films-woman-smart-glasses-money" title="New fear: Man films woman with smart glasses, seeks money to take video down" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="New fear: Man films woman with smart glasses, seeks money to take video down" title="New fear: Man films woman with smart glasses, seeks money to take video down" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/ChatGPT-Image-May-8--2026--05_27_52-PM.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/man-films-woman-smart-glasses-money" title="New fear: Man films woman with smart glasses, seeks money to take video down" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>New fear: Man films woman with smart glasses, seeks money to take video down</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/sstahie" title="Silviu STAHIE" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Silviu STAHIE" title="Silviu STAHIE" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w100/2026/03/BD_Silviu_Stahie_Pic3-1.jpeg" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/sstahie" title="Silviu STAHIE" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Silviu STAHIE
         </a></div> <p style="color:#757575;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/clickfix-compromised-wordpress-sites-vidar-stealer-australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/clickfix-vidar-stealer-australia-header.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/very-small-business" title="Very Small Business" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Very Small Business
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/clickfix-compromised-wordpress-sites-vidar-stealer-australia" title="ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Filip TRUȚĂ" title="Filip TRUȚĂ" data-src="https://0.gravatar.com/avatar/377aeee1f02a7ae7ac62f20f2f4ce504?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/ftruta" title="Filip TRUȚĂ" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Filip TRUȚĂ
         </a></div> <p style="color:#757575;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/inside-department-4-russias-secret-school-for-hackers" title="Inside Department 4: Russia's secret school for hackers" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Inside Department 4: Russia's secret school for hackers" title="Inside Department 4: Russia's secret school for hackers" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/department-4.jpeg" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/inside-department-4-russias-secret-school-for-hackers" title="Inside Department 4: Russia's secret school for hackers" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Inside Department 4: Russia's secret school for hackers</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/gcluley" title="Graham CLULEY" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Graham CLULEY" title="Graham CLULEY" data-src="https://2.gravatar.com/avatar/5fdc27b8b6f6fd69e77aa017a53cceb5?s=64&amp;d=mm&amp;r=g" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/gcluley" title="Graham CLULEY" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Graham CLULEY
         </a></div> <p style="color:#757575;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/mothers-day-scams-2026" title="Mother’s Day scams: How to spot them and shop safely" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Mother’s Day scams: How to spot them and shop safely" title="Mother’s Day scams: How to spot them and shop safely" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/Instructure-confirms-breach--millions-of-Canvas-users-potentially-impacted--1-.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/mothers-day-scams-2026" title="Mother’s Day scams: How to spot them and shop safely" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Mother’s Day scams: How to spot them and shop safely</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/cpopov" title="Cristina POPOV" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Cristina POPOV" title="Cristina POPOV" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w100/2025/12/20251024_153349.jpg" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/cpopov" title="Cristina POPOV" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Cristina POPOV
         </a></div> <p style="color:#757575;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             4 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div><div><div class="tw-mb-4 tw-flex tw-gap-4 md:tw-mb-0 md:tw-block tw-mb-4 md:tw-mb-0"><a href="/en-us/blog/hotforsecurity/ubuntus-crypto-scam-x-twitter-solana" title="Ubuntu’s new AI dreams attracted a very old-fashioned crypto scam on X" class="tw-block tw-w-1/4 md:tw-mb-3 md:tw-w-full"><img width="400" height="300" alt="Ubuntu’s new AI dreams attracted a very old-fashioned crypto scam on X" title="Ubuntu’s new AI dreams attracted a very old-fashioned crypto scam on X" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w600/2026/05/ChatGPT-Image-May-8--2026--01_32_01-PM.png" class="tw-h-36 tw-w-full tw-object-contain tw-object-top md:tw-object-cover lg:tw-h-52"></a> <div class="tw-w-3/4 md:tw-w-full"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/ubuntus-crypto-scam-x-twitter-solana" title="Ubuntu’s new AI dreams attracted a very old-fashioned crypto scam on X" class="tw-text-lg tw-font-bold tw-leading-tight tw-line-clamp-2 lg:tw-text-xl xl:tw-text-2xl"><h3>Ubuntu’s new AI dreams attracted a very old-fashioned crypto scam on X</h3></a> <div><div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><a href="/en-us/blog/hotforsecurity/author/sstahie" title="Silviu STAHIE" class="tw-overflow-hidden tw-rounded-full tw-h-11 tw-w-11"><img width="50" height="50" alt="Silviu STAHIE" title="Silviu STAHIE" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w100/2026/03/BD_Silviu_Stahie_Pic3-1.jpeg" class="tw-h-full tw-w-full tw-object-cover"></a> <div class="tw-pl-2"><div class="tw-flex tw-flex-wrap tw-gap-x-2"><a href="/en-us/blog/hotforsecurity/author/sstahie" title="Silviu STAHIE" class="tw-py-1 tw-mr-1.5 last:tw-mr-0">Silviu STAHIE
         </a></div> <p style="color:#757575;">
         May 08, 2026
      </p></div> <div class="tw-relative tw-ml-5 tw-flex tw-items-center before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959] sm:first:before:tw-hidden"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 23 23" overflow="visible" class="tw-text-[#595959]"><path d="M11.5 2c5.2 0 9.5 4.3 9.5 9.5S16.7 21 11.5 21 2 16.7 2 11.5 6.3 2 11.5 2m0-2C5.1 0 0 5.1 0 11.5S5.1 23 11.5 23 23 17.9 23 11.5 17.9 0 11.5 0z" style="fill: currentColor"></path> <path d="M11.5 6.6v4.5M12 12.1l3.5 3.2" class="st0"></path></svg> <span class="tw-pl-2">
             3 min read
         </span></div> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></div></div> <div class="tw-mb-12 tw-mt-16"><button class="tw-rounded-lg tw-mx-auto tw-block tw-w-full tw-max-w-[260px] tw-cursor-pointer tw-bg-[#006dff] tw-px-10 tw-py-4 tw-text-sm tw-font-bold tw-text-white hover:tw-bg-[#0059d6] disabled:tw-pointer-events-none disabled:tw-opacity-50 focus:tw-bg-[#0045ad] focus-visible:tw-outline-2 focus-visible:tw-outline-offset-2 focus-visible:tw-outline-solid">
            Load more
         </button></div></div> <div class="tw-w-full lg:tw-w-1/3"><!----> <h2 class="tw-mb-7 tw-h-20 tw-border-b tw-border-[#e1e3e5]"><span class="tw-block tw-text-sm tw-font-medium tw-uppercase lg:tw-text-sm" style="color:#696969;">
      Right now
   </span> <span class="tw-block tw-text-xl tw-font-bold tw-uppercase lg:tw-text-2xl tw-text-black">
      Top posts
   </span></h2> <div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/set-up-parent-managed-whatsapp-account-child" title="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" class="tw-block tw-h-full"><img width="200" height="200" alt="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" title="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/03/whatsap-kids-child-manage-account.jpg" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/industry-news" title="Industry News" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Industry News
      </a><a href="/en-us/blog/hotforsecurity/tag/family" title="Family Safety" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Family Safety
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/set-up-parent-managed-whatsapp-account-child" title="Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         March 12, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/f1-returns-risks-of-free-streaming" title="As F1 Returns, So Do the Risks of Free Streaming" class="tw-block tw-h-full"><img width="200" height="200" alt="As F1 Returns, So Do the Risks of Free Streaming" title="As F1 Returns, So Do the Risks of Free Streaming" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/03/Gemini_Generated_Image_xyrhd9xyrhd9xyrh.png" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/threats" title="Threats" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Threats
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/f1-returns-risks-of-free-streaming" title="As F1 Returns, So Do the Risks of Free Streaming" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               As F1 Returns, So Do the Risks of Free Streaming
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         March 06, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/israel-iran-crisis-scams" title="War as a Hook: How Fraudsters Are Using the Israel-Iran Crisis to Target Netizens" class="tw-block tw-h-full"><img width="200" height="200" alt="War as a Hook: How Fraudsters Are Using the Israel-Iran Crisis to Target Netizens" title="War as a Hook: How Fraudsters Are Using the Israel-Iran Crisis to Target Netizens" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/03/Spam-email-and-virus--concept--man-using-laptop-with-spam-email-icon---scammer---malware--virus.-1810551459_3866x2580.jpg" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><a href="/en-us/blog/hotforsecurity/tag/alert" title="alert" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">alert
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/israel-iran-crisis-scams" title="War as a Hook: How Fraudsters Are Using the Israel-Iran Crisis to Target Netizens" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               War as a Hook: How Fraudsters Are Using the Israel-Iran Crisis to Target Netizens
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         March 05, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/discord-scam-accidentally-reported" title="The ‘I Accidentally Reported You’ Discord Scam: What You Need to Know" class="tw-block tw-h-full"><img width="200" height="200" alt="The ‘I Accidentally Reported You’ Discord Scam: What You Need to Know" title="The ‘I Accidentally Reported You’ Discord Scam: What You Need to Know" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/02/discord_scam_i_reported_you.png" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/discord-scam-accidentally-reported" title="The ‘I Accidentally Reported You’ Discord Scam: What You Need to Know" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               The ‘I Accidentally Reported You’ Discord Scam: What You Need to Know
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         February 27, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/which-big-tech-companies-do-you-trust-or-not-we-asked-netizens" title="Which Big Tech Companies Do You Trust (or Not)? We Asked Netizens" class="tw-block tw-h-full"><img width="200" height="200" alt="Which Big Tech Companies Do You Trust (or Not)? We Asked Netizens" title="Which Big Tech Companies Do You Trust (or Not)? We Asked Netizens" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2026/02/big-tech-header.jpg" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/digital-privacy" title="Digital Privacy" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Digital Privacy
      </a><a href="/en-us/blog/hotforsecurity/tag/tips-and-tricks" title="Tips and Tricks" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Tips and Tricks
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/which-big-tech-companies-do-you-trust-or-not-we-asked-netizens" title="Which Big Tech Companies Do You Trust (or Not)? We Asked Netizens" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               Which Big Tech Companies Do You Trust (or Not)? We Asked Netizens
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         February 18, 2026
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div><div class="tw-mb-6 tw-flex tw-gap-4 tw-border-b tw-border-[#e1e3e5] tw-pb-6 last:tw-border-b-0"> <div class="tw-w-1/4"><a href="/en-us/blog/hotforsecurity/streaming-subscription-scams-dark-net" title="Streaming Subscription Scams: What Users Need to Know" class="tw-block tw-h-full"><img width="200" height="200" alt="Streaming Subscription Scams: What Users Need to Know" title="Streaming Subscription Scams: What Users Need to Know" data-src="https://blogapp.bitdefender.com/hotforsecurity/content/images/size/w300/2025/12/51ae8402-f997-41c2-8867-1c932eaada64.png" class="tw-h-full tw-w-full tw-object-top tw-object-contain"></a></div> <div class="tw-w-3/4"><div class="tw-mb-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-xs tw-font-bold tw-uppercase" style="color:#006DFF;"><a href="/en-us/blog/hotforsecurity/tag/scam" title="Scam" class="tw-py-1 tw-relative tw-mr-4 after:tw-absolute after:tw-top-0 after:tw-bottom-0 after:tw--right-2.5 after:tw-m-auto after:tw-mr-0 after:tw-block after:tw-h-1 after:tw-w-1 after:tw-rounded-full after:tw-bg-current last:tw-mr-0 last:after:tw-hidden ">Scam
      </a><!----><!----> <!----></div> <a href="/en-us/blog/hotforsecurity/streaming-subscription-scams-dark-net" title="Streaming Subscription Scams: What Users Need to Know" class="tw-block"><h3 class="tw-font-bold tw-leading-tight tw-line-clamp-3 tw-text-lg">
               Streaming Subscription Scams: What Users Need to Know
            </h3></a> <div class="tw-mt-2.5 tw-flex tw-flex-wrap tw-items-center tw-text-sm"><!----> <div><!----> <p style="color:#757575;">
         December 18, 2025
      </p></div> <!----> <div class="tw-py-1 tw-relative tw-ml-5 before:tw-absolute before:tw-top-0 before:tw-bottom-0 before:tw--left-3 before:tw-m-auto before:tw-block before:tw-h-1 before:tw-w-1 before:tw-rounded-full before:tw-bg-[#595959]"><button aria-label="Add to bookmark" class="tw-block tw-text-base"><svg xmlns="http://www.w3.org/2000/svg" width="20" viewBox="0 0 50.9 52.1" overflow="visible" class="tw-w-[1em] tw-h-[1em]"><path d="M3.4 2.5h34.3c.4 0 .7.4.7.8v45.2c0 .6-.6.9-.9.5L21.1 37.3c-.4-.3-.8-.3-1.2 0L3.4 49.5c-.4.4-.9.1-.9-.5l.2-45.7c0-.4.3-.8.7-.8z" fill="#fff" stroke="#adb5b9" stroke-width="5" stroke-miterlimit="10"></path></svg> <!----></button></div></div></div></div></div></section> <!----> <div class="tw-fixed tw-top-0 tw-right-0 tw-z-[9999] tw-h-full tw-w-full tw-max-w-[450px] tw-translate-x-[450px] tw-bg-white tw-p-6 tw-transition-transform data-[bookmark-active=true]:tw-translate-x-0"><div class="tw-relative tw-mb-4"><h4 class="tw-text-sm tw-font-bold tw-uppercase tw-text-[#595959]">Bookmarks</h4> <button aria-label="Close bookmarks list" class="tw-absolute tw-right-0 tw-top-0 tw-bottom-0 tw-m-auto tw-flex tw-h-7 tw-w-7 tw-items-center tw-justify-center tw-text-2xl tw-text-[#595959] tw-opacity-50 hover:tw-opacity-100"><svg aria-hidden="true" focusable="false" role="img" width="24" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512" class="tw-w-[1em] tw-h-[1em]"><path fill="currentColor" d="M207.6 256l107.72-107.72c6.23-6.23 6.23-16.34 0-22.58l-25.03-25.03c-6.23-6.23-16.34-6.23-22.58 0L160 208.4 52.28 100.68c-6.23-6.23-16.34-6.23-22.58 0L4.68 125.7c-6.23 6.23-6.23 16.34 0 22.58L112.4 256 4.68 363.72c-6.23 6.23-6.23 16.34 0 22.58l25.03 25.03c6.23 6.23 16.34 6.23 22.58 0L160 303.6l107.72 107.72c6.23 6.23 16.34 6.23 22.58 0l25.03-25.03c6.23-6.23 6.23-16.34 0-22.58L207.6 256z"></path></svg></button></div> <div class="tw-h-full tw-overflow-y-auto"><hr class="tw-mb-4"> <!----> </div></div> <div class="tw-fixed tw-top-1/3 tw-right-0 tw-left-0 tw-z-[9999] tw-m-auto tw-hidden tw-h-12 tw-w-11/12 tw-max-w-3xl tw-overflow-hidden tw-rounded-lg tw-border tw-border-[#595959] tw-bg-[#343a40] tw-text-white data-[search-show=true]:tw-block data-[search-active=true]:tw-h-96"><div class="tw-relative"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58.1 59.4" width="22" overflow="visible" class="tw-w-[1em] tw-h-[1em] icon-search tw-absolute tw-left-3 tw-top-3 tw-text-2xl tw-opacity-50"><circle cx="23" cy="23" r="20.5" class="icon-search-inner"></circle> <path d="M39.5 35.2l16.1 11.7" class="icon-search-inner"></path></svg> <input placeholder="What are you looking for?" class="tw-block tw-h-12 tw-w-full tw-border-0 tw-bg-transparent tw-py-2.5 tw-pl-12 tw-pr-2.5 tw-text-2xl tw-text-white"> <div class="tw-my-2 tw-h-80 tw-overflow-y-auto"><img data-src="https://download.bitdefender.com/resources/themes/draco/images/lite_v2/blog-images/loader-white.svg" alt="loader" title="loader" class="tw-mx-auto tw-block tw-h-14 tw-w-32 tw-object-cover"> <!----> </div></div></div> <footer class="tw-bg-[#111] tw-py-12"><div class="tw-container tw-items-center tw-text-center tw-flex-col lg:tw-text-left"><div class="tw-flex tw-flex-col lg:tw-flex-row lg:tw-justify-between tw-items-center lg:tw-items-end tw-pb-3 tw-mb-4 tw-border-b tw-border-solid tw-border-white"><a title="Bitdefender" aria-label="Bitdefender" href="/" class="tw-block tw-w-[150px] tw-pb-3 lg:tw-pb-0"><svg xmlns="http://www.w3.org/2000/svg" width="189.789" height="27.868" viewBox="0 0 189.789 27.868" class="tw-block tw-w-full"><path fill="#fff" d="M176.528 83.716a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.146 12.146 0 0 0 4.652-.865l2.477-4.146-.328-.192a14.073 14.073 0 0 1-6.407 1.694c-3 0-5.6-1.517-5.888-4.141h13.274v-1.2c0-6.067-3.678-9.485-8.536-9.485m-4.739 7.415a4.318 4.318 0 0 1 4.5-4.146c2.724 0 4.394 1.6 4.425 4.146zm95.177-7.4a8.718 8.718 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.086 12.086 0 0 0 4.642-.865l2.487-4.146-.328-.177a14.1 14.1 0 0 1-6.412 1.694c-3 0-5.59-1.517-5.883-4.141h13.264c.575-6.836-3.093-10.688-8.536-10.688m-4.737 7.417a4.314 4.314 0 0 1 4.49-4.146c2.724 0 4.394 1.6 4.43 4.146zm-56.1-7.417a8.723 8.723 0 0 0-9.081 9.161c0 5.491 4.036 9.161 9.848 9.161a12.126 12.126 0 0 0 4.652-.865l2.477-4.146-.333-.177a14.038 14.038 0 0 1-6.4 1.694c-3 0-5.6-1.517-5.888-4.141h13.279c.575-6.836-3.1-10.688-8.546-10.688m-4.732 7.417a4.318 4.318 0 0 1 4.5-4.146c2.719 0 4.394 1.6 4.425 4.146zM116.2 88.039v-.071a5.717 5.717 0 0 0 4.46-5.632c0-4.692-3.991-6.471-7.865-6.471H99.68v.384l1.32 1.122c1.584 1.294 1.786 1.542 1.786 2.71v21.528h9.258c4.853 0 9.722-1.744 9.722-7.346a6.128 6.128 0 0 0-5.55-6.219m-8.864-8.256h3.769c2.553 0 3.34.354 4.112 1.092a2.931 2.931 0 0 1 .858 2.22 2.885 2.885 0 0 1-.883 2.149c-.757.728-1.8 1.082-3.688 1.082h-4.167zm4.208 17.888h-4.208v-7.413h4.389c3.7 0 5.439.945 5.439 3.635 0 3.382-3.269 3.782-5.62 3.782m18.83-19.45a2.8 2.8 0 1 1-2.8-2.629 2.681 2.681 0 0 1 2.825 2.619m-7.336 5.936h6.695V101.6h-4.359V87.872c0-1.441-.081-1.673-1.645-2.882l-.691-.551zm34.65-9.06l1.367.88c1.241.794 1.428 1.173 1.428 2.28v8.089h-.106a7.158 7.158 0 0 0-5.913-2.654c-4.969 0-8.42 4-8.42 9.161s3.234 9.161 8.6 9.161a6.746 6.746 0 0 0 5.989-3.034h.071l.454 2.619h3.678V74.782h-7.147zm-2.174 23a5.234 5.234 0 1 1 5.121-5.233 5.059 5.059 0 0 1-5.121 5.233m92.473-23l.605.4c2.1 1.33 2.361 1.714 2.361 3.984v6.89h-.111a7.166 7.166 0 0 0-5.913-2.654c-4.969 0-8.415 4-8.415 9.161s3.229 9.161 8.577 9.161a6.734 6.734 0 0 0 5.989-3.034h.076l.459 2.619h3.678V74.782h-7.315zm-2.018 23a5.234 5.234 0 1 1 5.116-5.233 5.059 5.059 0 0 1-5.116 5.237m43.449-14.156v4.216a8.7 8.7 0 0 0-2.1-.329 4.391 4.391 0 0 0-4.682 4.4v9.343h-4.349V88.706c0-2.194-.116-2.528-1.887-3.645l-1.095-.723v-.192h7.341v2.771h.076a5.549 5.549 0 0 1 5.151-3.2 5.715 5.715 0 0 1 1.559.253m-96.673.11h4.036v3.72H192.8v13.8h-4.369V89.3c0-1.461-.293-1.785-2.018-3.155l-2.22-1.81v-.255h4.243V80.9c0-4.737 3.083-7.746 9.752-6.411l1.009 3.7-.212.172c-3.486-1.375-6.185-.506-6.185 2.528zm41.239 6.5v11.02h-4.354v-9.709c0-1.921-.5-4.247-3.532-4.247-2.866 0-3.991 2.108-3.991 4.434v9.522h-4.349V88.7c0-2.194-.116-2.528-1.887-3.645l-1.059-.723v-.192h7.114v2.66h.071a6.742 6.742 0 0 1 5.55-3.094c4.112 0 6.483 2.821 6.483 6.866m-89.345 7.523l.141.091s-2.164 3.468-2.159 3.468c-3.532.966-7.537-.061-7.537-5.764v-7.078c0-1.127-.182-1.067-2.623-3.084l-1.579-1.37v-.207h4.228L136.8 79.1h2.76v5.056h4.657v3.7h-4.657v7.912c0 3.15 2.154 3.226 5.186 2.326" transform="translate(-99.68 -74.171)"></path></svg></a> <svg xmlns="http://www.w3.org/2000/svg" width="201.188" height="24.44" viewBox="0 0 201.188 24.44"><path id="Path_2" data-name="Path 2" d="M14.482-14.638v-3.51H.7v3.51H5.616V0H9.568V-14.638ZM19.656,0V-7.982c0-1.586,1.092-2.08,3.328-2.08h.962V-13.65H23.27a3.422,3.422,0,0,0-3.484,2.964h-.13V-13.65H15.808V0ZM34.372,0H38.22V-13.65H34.372v8.866a2.173,2.173,0,0,1-2.418,1.976c-1.4,0-1.95-.936-1.95-2.6V-13.65H26.156v8.58c0,3.432,1.482,5.382,4.264,5.382a3.706,3.706,0,0,0,3.822-2.6h.13ZM46.436.312c3.51,0,5.85-1.924,5.85-4.55,0-2.366-1.534-3.718-4.5-4.108l-1.534-.208c-1.118-.156-1.43-.546-1.43-1.274,0-.676.52-1.144,1.82-1.144a4.563,4.563,0,0,1,3.146,1.4L52-11.83a6.861,6.861,0,0,0-5.564-2.132c-3.25,0-5.3,1.82-5.3,4.446,0,2.47,1.508,3.822,4.6,4.212l1.482.182c.962.13,1.378.468,1.378,1.144,0,.806-.52,1.3-2.028,1.3A4.746,4.746,0,0,1,42.952-4.42L40.69-2.132A7.126,7.126,0,0,0,46.436.312ZM61.776,0V-2.99h-2.5v-7.67h2.7v-2.99h-2.7v-3.692H55.822v2.236c0,.936-.312,1.456-1.352,1.456h-.962v2.99h1.924v6.682c0,2.6,1.4,3.978,4.056,3.978Zm8.476.312a7.4,7.4,0,0,0,5.72-2.262L74.048-4.342A4.326,4.326,0,0,1,70.694-2.7a2.682,2.682,0,0,1-3.016-2.938V-5.85H76.44V-6.994c0-3.692-1.82-6.968-6.344-6.968-4.108,0-6.4,2.808-6.4,7.124C63.7-2.47,66.066.312,70.252.312Zm-.078-11.44c1.534,0,2.288,1.118,2.288,2.782v.234H67.678V-8.32A2.5,2.5,0,0,1,70.174-11.128ZM87.542,0H91.39V-19.24H87.542v7.878h-.13a3.7,3.7,0,0,0-3.666-2.6c-3.458,0-5.252,2.5-5.252,7.124S80.288.312,83.746.312a3.727,3.727,0,0,0,3.666-2.6h.13ZM85.02-2.808A2.565,2.565,0,0,1,82.5-5.642V-8.008a2.565,2.565,0,0,1,2.522-2.834c1.456,0,2.522.754,2.522,2v4.03C87.542-3.562,86.476-2.808,85.02-2.808ZM97.214.286A2,2,0,0,0,99.5-1.794v-.52a2,2,0,0,0-2.288-2.08,2,2,0,0,0-2.288,2.08v.52A2,2,0,0,0,97.214.286ZM124.67,0l-5.9-18.148H113.88L107.9,0h4l1.3-4.316h6.058L120.562,0ZM118.3-7.67h-4.16l2-6.89h.13ZM132.548,0V-2.99h-1.716V-19.24h-3.848v15.5c0,2.418,1.2,3.744,3.822,3.744Zm4.732,0h3.952L142.9-5.772l.936-3.536h.078l.962,3.536L146.536,0h4.03l3.77-13.65h-3.562l-1.326,5.512-.936,4.16h-.1l-1.118-4.16L145.7-13.65h-3.51l-1.56,5.512-1.092,4.16h-.1l-.936-4.16-1.326-5.512h-3.718Zm31.2,0V-2.99h-1.274V-8.97c0-3.224-1.976-4.992-5.824-4.992-2.86,0-4.42.988-5.512,2.6l2.288,2.028a3.37,3.37,0,0,1,2.938-1.612c1.612,0,2.262.832,2.262,2.158v.858H161.2c-3.614,0-5.85,1.378-5.85,4.264,0,2.366,1.508,3.978,4.238,3.978,2.08,0,3.588-.936,4-2.7h.156A2.6,2.6,0,0,0,166.348,0Zm-7.462-2.366c-1.144,0-1.794-.468-1.794-1.456v-.39c0-.988.78-1.534,2.262-1.534h1.872v1.612C163.358-2.886,162.292-2.366,161.018-2.366ZM177.164-7.28,176.15-3.328h-.156l-.988-3.952-2-6.37h-3.822L173.966.7,173.5,2.21h-2.574V5.2h2.392c2.34,0,3.484-.988,4.186-3.094l5.252-15.756h-3.588ZM189.1.312c3.51,0,5.85-1.924,5.85-4.55,0-2.366-1.534-3.718-4.5-4.108l-1.534-.208c-1.118-.156-1.43-.546-1.43-1.274,0-.676.52-1.144,1.82-1.144a4.563,4.563,0,0,1,3.146,1.4l2.21-2.262a6.861,6.861,0,0,0-5.564-2.132c-3.25,0-5.3,1.82-5.3,4.446,0,2.47,1.508,3.822,4.6,4.212l1.482.182c.962.13,1.378.468,1.378,1.144,0,.806-.52,1.3-2.028,1.3a4.746,4.746,0,0,1-3.614-1.742l-2.262,2.288A7.126,7.126,0,0,0,189.1.312ZM199.6.286a2,2,0,0,0,2.288-2.08v-.52a2,2,0,0,0-2.288-2.08,2,2,0,0,0-2.288,2.08v.52A2,2,0,0,0,199.6.286Z" transform="translate(-0.702 19.24)" fill="#fff"></path></svg></div> <div class="tw-pb-3 [&amp;_*]:tw-text-[13px] lg:[&amp;_*]:tw-text-[14px] [&amp;_*]:tw-text-white [&amp;_a]:tw-no-underline hover:[&amp;_a]:tw-underline [&amp;_span]:tw-px-3 lg:[&amp;_span]:tw-px-4"><a href="https://www.bitdefender.com/site/view/legal-terms.html" title="Legal Information">Legal Information</a> <span>|</span> <a href="https://www.bitdefender.com/site/view/legal-privacy-policy-for-bitdefender-websites.html" title="Privacy Policy">Privacy Policy</a> <span>|</span> <a href="https://www.bitdefender.com/site/Main/contact/1" title="Contact Us">Contact Us</a></div> <div class="tw-flex tw-flex-col lg:tw-flex-row lg:tw-justify-between tw-items-center"><span class="tw-pb-3 lg:tw-pb-0 tw-text-[13px] lg:tw-text-[14px] tw-text-[#969696]">
            Copyright © 1997 - 2026 Bitdefender.
         </span> <div><div class="tw-flex tw-items-center tw-justify-center lg:tw-justify-end"><a aria-label="Facebook Bitdefender" title="Facebook Bitdefender" rel="nofollow" target="_blank" href="https://facebook.com/Bitdefender/" class="tw-flex tw-items-center tw-bg-none tw-mr-2 tw-p-2"><svg xmlns="http://www.w3.org/2000/svg" height="16" width="16" viewBox="0 0 512 512" class="tw-h-5 tw-w-5"><path opacity="1" fill="#595959" d="M512 256C512 114.6 397.4 0 256 0S0 114.6 0 256C0 376 82.7 476.8 194.2 504.5V334.2H141.4V256h52.8V222.3c0-87.1 39.4-127.5 125-127.5c16.2 0 44.2 3.2 55.7 6.4V172c-6-.6-16.5-1-29.6-1c-42 0-58.2 15.9-58.2 57.2V256h83.6l-14.4 78.2H287V510.1C413.8 494.8 512 386.9 512 256h0z"></path></svg></a> <a aria-label="Twitter Bitdefender" title="Twitter Bitdefender" rel="nofollow" target="_blank" href="https://twitter.com/bitdefender/" class="tw-flex tw-items-center tw-bg-none tw-mr-2 tw-p-2"><svg xmlns="http://www.w3.org/2000/svg" height="16" width="16" viewBox="0 0 512 512" class="tw-h-5 tw-w-5"><path opacity="1" fill="#595959" d="M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z"></path></svg></a> <a aria-label="Instagram Bitdefender" title="Instagram Bitdefender" rel="nofollow" target="_blank" href="https://instagram.com/bitdefender/" class="tw-flex tw-items-center tw-bg-none tw-mr-2 tw-p-2"><svg xmlns="http://www.w3.org/2000/svg" height="16" width="14" viewBox="0 0 448 512" class="tw-h-5 tw-w-5" data-v-0f536bc0=""><path opacity="1" fill="#595959" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z" data-v-0f536bc0=""></path></svg></a> <!----> <a aria-label="Youtube Bitdefender" title="Youtube Bitdefender" rel="nofollow" target="_blank" href="https://www.youtube.com/Bitdefender/" class="tw-flex tw-items-center tw-bg-none tw-mr-2 tw-p-2"><svg xmlns="http://www.w3.org/2000/svg" width="25.6" height="18" viewBox="0 0 25.6 18" class="tw-h-5 tw-w-5"><path id="Path_5" data-name="Path 5" d="M25.765-15.184A3.217,3.217,0,0,0,23.5-17.462c-2-.538-10-.538-10-.538s-8.005,0-10,.538a3.217,3.217,0,0,0-2.263,2.278A33.744,33.744,0,0,0,.7-8.982a33.744,33.744,0,0,0,.535,6.2A3.169,3.169,0,0,0,3.5-.538C5.495,0,13.5,0,13.5,0s8.005,0,10-.538A3.169,3.169,0,0,0,25.765-2.78a33.744,33.744,0,0,0,.535-6.2A33.744,33.744,0,0,0,25.765-15.184ZM10.882-5.175v-7.613l6.691,3.806L10.882-5.175Z" transform="translate(-0.7 18)" fill="#595959"></path></svg></a></div></div></div></div></footer></div></div></div></div><script nonce="DhcnhD3khTMePgXW">window.__NUXT__=(function(a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W,X,Y,Z,_,$,aa,ab,ac,ad,ae,af,ag,ah,ai,aj,ak,al,am,an,ao,ap,aq,ar,as,at,au,av,aw,ax,ay,az,aA,aB,aC,aD,aE,aF,aG,aH,aI,aJ,aK,aL,aM,aN,aO,aP,aQ,aR,aS,aT,aU,aV,aW,aX,aY,aZ,a_,a$,ba,bb,bc,bd,be,bf,bg,bh,bi,bj,bk,bl,bm,bn,bo,bp,bq,br,bs,bt,bu,bv,bw,bx,by,bz,bA,bB,bC,bD,bE,bF,bG,bH,bI,bJ,bK,bL,bM,bN,bO,bP,bQ,bR,bS){bI.HFS=_;bI.LAB="labs";bI.BI="businessinsights";bI.CYB="cyberpedia";return {layout:"default",data:[{featuredPost:[{id:"69f9a9262fa53a9f2eef6c98",title:"World Password Day: Be honest… how are you really handling your passwords?",slug:"world-password-day-2026",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002F16oriz-EN.png",featured:m,published_at:"2026-05-06T12:22:34.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EWorld Password Day is here again. Let’s start off by asking a simple question.\u003C\u002Fp\u003E\u003Cp\u003EWhen was the last time you actually thought about your passwords? Are you using one password for multiple accounts because it’s easier? Maybe you’ve written one down somewhere “safe,” just in case. Or you rely on your browser to remember everything so you don’t have to.\u003C\u002Fp\u003E\u003Cp\u003EIf any of that sounds familiar, you’re in very good company. And that’s exactly why World Password Day still matters.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003E37% of people still write their passwords down\u003C\u002Fstrong\u003E, and \u003Cstrong\u003E17% use them for multiple accounts\u003C\u002Fstrong\u003E, which makes it easier for attackers to unlock more than one account at a time\u003C\u002Fli\u003E\u003Cli\u003EThe \u003Cstrong\u003Eway we manage passwords creates risk\u003C\u002Fstrong\u003E, especially when convenience takes priority over security\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPhishing, data breaches, and infostealer malware\u003C\u002Fstrong\u003E are some of the most common ways credentials get stolen today\u003C\u002Fli\u003E\u003Cli\u003EA single exposed password can trigger a \u003Cstrong\u003Eripple effect\u003C\u002Fstrong\u003E, giving attackers access to email, social media, shopping, and even financial accounts\u003C\u002Fli\u003E\u003Cli\u003ETools like \u003Cstrong\u003EBitdefender Password Manager\u003C\u002Fstrong\u003E and \u003Cstrong\u003EBitdefender Password Generator\u003C\u002Fstrong\u003E help remove the need to remember or reuse passwords, making security easier to maintain\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"we-know-the-rules-we-just-don%E2%80%99t-follow-them\"\u003EWe know the rules. We just don’t follow them.\u003C\u002Fh2\u003E\u003Cp\u003EThere’s no shortage of advice out there about passwords. Make them long. Make them unique. Don’t reuse them. Don’t write them down.\u003C\u002Fp\u003E\u003Cp\u003EAnd yet, when you look at how people actually behave, the story is very different.\u003C\u002Fp\u003E\u003Cp\u003EThe \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fbitdefender-2025-consumer-cybersecurity-survey\" rel=\"noreferrer\"\u003EBitdefender Consumer Cybersecurity Survey\u003C\u002Fa\u003E 2025 shows that more than a third of people still write their passwords down, and nearly one in five use the same password for multiple accounts. Only about a quarter rely on a password manager.\u003C\u002Fp\u003E\u003Cp\u003EWhat does this teach us? Well, convenience wins. Remembering dozens of complex passwords isn’t easy, so small shortcuts feel extremely reasonable.\u003C\u002Fp\u003E\u003Ch2 id=\"how-passwords-get-scooped\"\u003EHow passwords get scooped\u003C\u002Fh2\u003E\u003Cp\u003EMany attacks are built around everyday behavior.\u003C\u002Fp\u003E\u003Cp\u003ESometimes it’s as simple as a phishing email that looks just convincing enough. A fake login page, a security alert, a message that creates a sense of urgency. You enter your password thinking you’re fixing a problem, but in that moment, you’ve handed it over.\u003C\u002Fp\u003E\u003Cp\u003EOther times, it’s quieter. Malware like infostealers has become one of the most effective tools around. Bitdefender \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Flabs\u002Flummastealer-second-life-castleloader\" rel=\"noreferrer\"\u003Eresearch\u003C\u002Fa\u003E into threats like LummaStealer shows how easily they can spread, often through fake download links or even fake verification prompts. You click once, thinking you’re proving you’re human, but in the background, your data starts getting collected.\u003C\u002Fp\u003E\u003Cp\u003EWhat makes this especially dangerous is how much these threats can access. Saved passwords, autofill data, session cookies that keep you logged in without needing a password at all. It’s not just one account at risk. It’s everything on that device.\u003C\u002Fp\u003E\u003Ch2 id=\"and-then-come-data-breaches-and-leaks\"\u003EAnd then come data breaches and leaks\u003C\u002Fh2\u003E\u003Cp\u003ECompanies get breached all the time. Databases leak. Of course, our credentials end up circulating online for years, often without us realizing it.\u003C\u002Fp\u003E\u003Cp\u003ETake the so-called “\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fdata-in-mother-of-all-breaches-was-likely-stolen-years-ago\" rel=\"noreferrer\"\u003EMother of All Breaches\u003C\u002Fa\u003E.” It wasn’t just a single incident, but a massive compilation of around 1.2TB of exposed login credentials, gathered over time. Inside that data were billions of records, including email addresses, usernames, passwords, and other login-related details that attackers can still use.\u003C\u002Fp\u003E\u003Cp\u003EWhat’s unsettling is that this kind of data doesn’t just disappear. It sticks around, gets shared, repackaged, and reused in attacks.\u003C\u002Fp\u003E\u003Cp\u003EEarlier compilations like “Collection #1” or “RockYou2024” followed the same pattern, taking previously stolen credentials and bundling them into massive datasets that attackers can easily search and exploit.\u003C\u002Fp\u003E\u003Ch2 id=\"one-password-rarely-stays-just-one-problem\"\u003EOne password rarely stays just one problem\u003C\u002Fh2\u003E\u003Cp\u003EHere’s where things escalate.\u003C\u002Fp\u003E\u003Cp\u003EWhen a password is exposed, it rarely stops at a single account. It becomes a starting point.\u003C\u002Fp\u003E\u003Cp\u003EIf that password is reused, attackers can move quickly from one account to another. Email is often the first target, because once that’s compromised, it can be used to reset access to everything else. Social media accounts, shopping platforms, even financial services often follow. And if session data has been stolen, attackers might not even need your password again. They’re already inside, moving freely.\u003C\u002Fp\u003E\u003Cp\u003EWhat started as a small shortcut suddenly turns into a much bigger issue.\u003C\u002Fp\u003E\u003Ch2 id=\"passwords-are-still-here-whether-we-like-it-or-not\"\u003EPasswords are still here, whether we like it or not\u003C\u002Fh2\u003E\u003Cp\u003EThere’s a lot of talk about moving beyond passwords. Passkeys, biometrics, hardware security keys, all of these are gaining ground and, in many ways, they’re better.\u003C\u002Fp\u003E\u003Cp\u003EBut in 2026, passwords are still the default for most services people use every day. They’re built into how we log in, how we verify identity, and how we access services from email to banking.\u003C\u002Fp\u003E\u003Cp\u003EThis means password hygiene is still something we can’t afford to ignore.\u003C\u002Fp\u003E\u003Ch2 id=\"you-don%E2%80%99t-need-a-perfect-memory-you-need-a-better-system\"\u003EYou don’t need a perfect memory. You need a better system.\u003C\u002Fh2\u003E\u003Cp\u003EA password manager like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fpassword-manager\" rel=\"noreferrer\"\u003EBitdefender Password Manager\u003C\u002Fa\u003E changes the way you interact with passwords altogether. Instead of trying to remember everything, it generates strong, unique passwords for each account and stores them securely. When you need to log in, it fills in the details for you, so you’re not relying on memory or risky shortcuts.\u003C\u002Fp\u003E\u003Cp\u003EIt also removes the temptation to reuse passwords or write them down, because you no longer need to.\u003C\u002Fp\u003E\u003Cp\u003EIf you’re not sure or ready to turn to a password manager yet, but find yourself stuck creating a password, you can use the \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fpassword-generator\" rel=\"noreferrer\"\u003EBitdefender Password Generator\u003C\u002Fa\u003E for free to create &nbsp;a password that’s long, random, and difficult to crack, without you having to think about it.&nbsp; And make sure you always enable 2FA or MFA whenever available.\u003C\u002Fp\u003E\u003Ch3 id=\"a-more-complete-way-to-stay-protected-and-level-up-your-cybersecurity-posture\"\u003EA more complete way to stay protected and level up your cybersecurity posture\u003C\u002Fh3\u003E\u003Cp\u003EEven with good habits, \u003Cstrong\u003Epassword hygiene alone isn’t always enough to fully protect your digital life anymore\u003C\u002Fstrong\u003E. Phishing can trick you. Infostealers can silently extract your data. Old breaches can resurface years later. It’s not just about one password; it’s about everything connected to it. An all-in-one security solution like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fultimate-security\" rel=\"noreferrer\"\u003EBitdefender Ultimate Security\u003C\u002Fa\u003E helps cover those gaps from multiple angles. That includes \u003Cstrong\u003Estrong password management\u003C\u002Fstrong\u003E, \u003Cstrong\u003Eaward-winning anti-malware protection\u003C\u002Fstrong\u003E, \u003Cstrong\u003Ephishing detection\u003C\u002Fstrong\u003E, \u003Cstrong\u003Escam protection\u003C\u002Fstrong\u003E and \u003Cstrong\u003Edigital identity protection\u003C\u002Fstrong\u003E which alerts you if your personal data, including passwords, shows up in breaches.\u003C\u002Fp\u003E",tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:"66f50fb228045a04f10ce98f",name:"The Safe Nomad",slug:"safe-nomad",description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:n,name:o,slug:p,profile_image:q,cover_image:a,bio:r,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:"World Password Day is here again. Let’s start off by asking a simple question.\n\nWhen was the last time you actually thought about your passwords? Are you using one password for multiple accounts because it’s easier? Maybe you’ve written one down somewhere “safe,” just in case. Or you rely on your browser to remember everything so you don’t have to.\n\nIf any of that sounds familiar, you’re in very good company. And that’s exactly why World Password Day still matters.\n\n\nKey takeaways\n\n * 37% of peo",reading_time:H,url:"\u002Fblog\u002Fhotforsecurity\u002Fworld-password-day-2026\u002F"}],topPost:[{id:aa,title:ab,slug:ac,feature_image:ad,featured:c,published_at:ae,custom_excerpt:a,plaintext:"WhatsApp is rolling out a major new feature designed to make the world’s most popular messaging service safer for kids: parent-managed accounts.\n\n\nKey takeaways:\n\n\n * \n   \n   \n   WhatsApp is formally expanding into the pre-teen space with built-in parental oversight\n   \n\n * \n   \n   \n   Parent-managed accounts are designed with expert and family input\n   \n\n * \n   \n   \n   Parents retain control over privacy and contact permissions, while core protections like end-to-end encryption remain intact\n   \n\n * \n   \n   \n   Advanced features such as Channels, AI tools, and Status may be restricted, limiting exposure to broader social features\n   \n\n * \n   \n   \n   The rollout is gradual and global, suggesting WhatsApp is testing and refining the feature based on feedback\n   \n\n\n\nIntroducing parent-managed accounts on WhatsApp\n\n\n\n“With input from families and experts, we're rolling out new parent-managed accounts that allow parents or guardians to set up WhatsApp for pre-teens, with new controls to limit their WhatsApp experience to messaging and calling,” the Meta-owned company announced this week.\n\nParents can now create and oversee a child’s WhatsApp account and control who can message or call their child, which groups they can join, and how privacy settings are configured.\n\nDesigned specifically for pre-teens, parent-managed accounts limit a child’s experience to core messaging and calling features while preventing access to advanced features like AI tools, Channels, and Status updates in some configurations.\n\nWhatsApp’s move reflects growing industry pressure to improve child safety online.\n\nHere are the step-by-step setup guides for both iPhone and Android devices on how to enable the feature.\n\nBefore you begin, make sure you and your child have:\n\n * Both devices (parent and child) nearby\n * Active WhatsApp installed\n * A phone number dedicated to the child’s account\n\n\nOn iPhone (iOS)\n\n\n\n1.     Open WhatsApp on the parent’s phone\n\n2.     Go to Settings → Account → Parent-Managed Accounts\n\n3.     Choose Set up a managed account\n\n4.     You’ll be prompted to enter your child’s phone number\n\n5.     WhatsApp will send a verification code to that number — enter it to verify\n\n6.     Follow the on-screen prompts to link your child’s device\n\n7.     Once the link is established, you’ll be asked to create a parent PIN\n\n8.     Confirm who can contact your child and set privacy choices\n\n\nOn Android\n\n\n\n1.     Launch WhatsApp on your device\n\n2.     Navigate to Settings → Account → Parent-Managed Accounts\n\n3.     Tap Create a managed account for a child\n\n4.     Enter your child’s phone number and complete the verification step\n\n5.     Follow the prompts to pair with your child’s phone using the QR code or PIN flow\n\n6.     Set up a parent PIN for managing settings\n\n7.     Customize contact permissions, group controls, and privacy filters\n\n(Note: These steps are based on published help content from WhatsApp — exact labels may vary depending on app version or region.)\n\n\nTips for parents after setup\n\n\n\nOnce your child’s account is linked, consider these best practices:\n\n * Review privacy settings periodically to ensure they still match your family’s comfort level\n * Limit group chats to only trusted contacts\n * Teach your child about online safety — including how to recognize suspicious contacts and not to share personal information\n\nWhatsApp added during the Wednesday announcement that it looks forward to feedback as it gradually rolls out the parent management feature over the coming months, \"so we can continue building WhatsApp to provide the safest and most private way for families to connect.\"\n\nA video guide on “Parent-managed accounts on WhatsApp” is also available:\n\n\n\n\nFrequently asked questions (FAQ)\n\n\nCan you set up parental controls on WhatsApp?\n\nWhatsApp does not offer built-in parental controls, but you can increase safety using privacy settings and device-level controls. Parents can restrict who can contact the child, disable profile visibility, and use third-party parental control apps to monitor usage and limit screen time.\n\n\nHow to set up Bitdefender parental control?\n\nTo set up Bitdefender Parental Control, install the Bitdefender app on the parent’s device and create a child profile. Then install the Parental Control app on the child’s device, log in with the same account, and link the device. From the dashboard, you can manage screen time, app usage, location tracking, and web filtering.\n\n\nHow to make your account parent-managed?\n\nTo make an account parent-managed, you typically need to create or link it through a parental control system such as Google Family Link or Apple Family Sharing. This allows a parent to supervise activity, set restrictions, approve downloads, and manage screen time from their own device.\n\nYou may also want to read:\n\nHow Kids Bypass Age Verification Online and what Families Can Do About It\n\nYouTube Gives Parents More Control Over Teens’ Shorts and Screen Time\n\nChatGPT Now Has Parental Controls: What Parents Can Now Do and What They Can’t",tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:af,name:ag,slug:ah,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:ai,url:aj},{id:ak,title:al,slug:am,feature_image:an,featured:m,published_at:ao,custom_excerpt:O,plaintext:"Free F1 streaming sites may seem like an easy way to watch races—but they often come with hidden risks. Behind the promise of “free access” lies a complex ecosystem of tracking, malware, and aggressive monetization. Understanding these risks is essential before clicking on unofficial streams.\n\n\nKey Takeaways\n\n * Free streaming sites are rarely truly “free.” Many operate as traffic monetization networks, using redirects, hidden ads, and scripts to generate revenue from every click.\n * Malware and data tracking are major risks. Users can be exposed to malicious downloads, hidden trackers, and data harvesting mechanisms that collect browsing behavior.\n * Sites often use deceptive infrastructure to avoid detection. Domains rotate frequently, and hidden elements like pop-unders and iframes run in the background without user awareness.\n * Children face additional exposure to harmful content. Unregulated streaming sites may display gambling ads, explicit material, and unsafe chat environments.\n\n\nWhy Free F1 Streaming Sites Are Risky and What to Watch Out For\n\nSpring signals the return of major global sporting events, including Formula One and the start of baseball season, with this year drawing even greater worldwide attention due to the FIFA World Cup 2026.\n\nGlobal audiences are once again searching for ways to follow live action across time zones and devices. At the same time, the steady rise in subscription costs, the continued decline of traditional cable bundles, and the reality of watching while traveling have driven more viewers toward “free” streaming alternatives.\n\nEasy-to-find websites that promise free streaming can seem like a great deal, especially when subscription costs continue to rise. But they are rarely free in any real sense. The people behind these services do not need sophisticated scams to attract users. They simply rely on demand, curiosity, and the appeal of saving money. Once someone visits the site, the real business model begins. Every click, redirect, and interaction becomes an opportunity to generate revenue, often in ways users never see.\n\nWhat begins as a visit can quickly turn users into victims, exposing them to malware infections and data harvesting. When children are involved, the risks escalate even further, with exposure to gambling promotions and adult content adding another layer of harm.\n\nTo better understand the risks, Bitdefender researchers analyzed a range of free streaming sites and uncovered consistent patterns of aggressive monetization, hidden tracking mechanisms, and malicious infrastructure operating behind the scenes.\n\n\nHow free streaming is gaining visibility\n\nIt’s not surprising that millions of people worldwide turn to their favorite search engine or AI assistant each day, using queries like “watch free live sports,” “free F1 stream,” or “no subscription football.”\n\nWith the right search terms, these websites will appear on the first page of Google. And even LLMs recommend them when queries are framed in certain ways.\n\nHere’s a snippet from a discussion with ChatGPT:\n\nLive sports and other events naturally create a sense of urgency. When a major game, race, or pay-per-view broadcast is about to begin, fans want immediate access. In that moment, some turn to alternative platforms, believing they’ve found a convenient and cost-effective solution.\n\nWebsites, IPTV apps, M3U playlists, Telegram channels, addons for video players, and “fully loaded” Android TV boxes promise access to streaming without monthly fees.\n\nWhile the offer feels simple, the infrastructure behind it is anything but. When a platform does not charge users directly, it monetizes them indirectly.\n\n\nWhat our technical review revealed\n\nWhen we took a closer look, we immediately saw clear patterns that these are very well-organized operations.\n\nMany of these free platforms rely on redirect chains. The user accesses a domain via a Google search, only to be redirected to a secondary site that later rotates to newly registered addresses. This domain pivoting will help the website operators bypass ISP blocks and quickly return after takedowns.\n\n\nHere are a few examples:\n\n\n\n\n * livesport24[.]watch → redirects to livetv[.]sx → which rotates to livetv873[.]me\n * viptrans[.]info → redirects to sharkstreams[.]net\n * streamshub[.]site → redirects to streameast[.]gl\n * streamarena[.]fit → redirects to crackstreams[.]gl\n * streamspass[.]fit → redirects to methstreams[.]gl\n * xtremeast[.]com → associated with variations of the streameast brand (including domain pivots such as streameasts[.]com and previously streameast[.]fun)\n\n\nWhat appear to be independent websites often have similar layouts, and one backend can power dozens of streaming storefronts.\n\nThe goal of most of these platforms is simple: to get users to open their websites with the promise of free live stream so that they can serve extremely aggressive ads.\n\nThe bigger problem, which is more concerning than the ads themselves, is the monetization techniques embedded in the code.\n\nAnother dangerous aspect is the use of invisible iframes. Regular iframes are used everywhere, and they are basically windows that embed content from another source into a host page, such as video players or ads.\n\nHowever, some pages contained invisible iframes (they function like regular ones, but are not visible to the website visitor) placed off-screen at coordinates such as -1000 pixels, which means that hidden elements load third-party pages in the background without the user knowing.\n\n\u003Ciframe width=\"0\" height=\"0\" style=\"position: absolute; top: -1000px; left: -1000px; visibility: hidden; border: medium none; background-color: transparent;\"\u003E\u003C\u002Fiframe\u003E\n\u003Ca href=\"https:\u002F\u002Ffrwibqgkiqzpz.site\u002Fad\u002Fvisit.php?al=1\" style=\"display: none; visibility: hidden; position: relative; left: -1000px; top: -1000px;\"\u003E\u003C\u002Fa\u003E\n\n\nThis technique can generate advertising revenue, start various background redirects and even silently connect users to other monetization networks.\n\nWe also observed DNS prefetch instructions that prepare connections to obscure external domains before any visible interaction occurs. This accelerates the loading of hidden traffic and improves ad delivery performance behind the scenes.\n\n\u003Clink rel=\"dns-prefetch\" href=\"\u002F\u002Fieenhjxbigyt[.]space\"\u003E\n\u003Clink rel=\"dns-prefetch\" href=\"\u002F\u002Fadexchangeclear[.]com\"\u003E\n\u003Clink rel=\"dns-prefetch\" href=\"\u002F\u002Ffrwlbqgkiqzpz[.]site\"\u003E\n\n\n\nThe reason for those strange domain names is simple. The website operations are trying to stay ahead of ad blockers, as older domain names get blacklisted.\n\n\nTracking and profiling\n\nSeveral analyzed pages embedded Google Analytics and Meta (Facebook) Pixel tracking scripts, and one of the websites even used tracking from Yandex, which is a Russian search engine.\n\nPixel tracking means the website sends browsing event data to Meta’s servers. or whichever service is used. That data can include the URL of the visited page, timestamp, IP address, browser configuration and other unique cookie identifiers.\n\nThis means that if a user is logged into Facebook or has Facebook cookies stored in the browser, Meta can associate that visit with an advertising profile. That profile will be used to server similar ads when visiting other websites.\n\nThe user's data trail doesn't disappear when the “free streaming website” is closed. There’s no such thing as a free lunch.\n\n\nThe malware and ad-fraud layer\n\nOther free streaming websites also integrate aggressive pop-under scripts and high-risk advertising networks. There’s no guarantee that a simple and annoying ad loaded today can’t be replaced with a much more dangerous one tomorrow.\n\nFurthermore, these scripts can trigger automatic redirects to online casinos, sports betting platforms, adult content portals, fake antivirus alerts or cryptocurrency investment scams. The variations are endless and are usually served depending on the location of the user.\n\nBecause these platforms operate outside regulated advertising frameworks, they might not filter inappropriate categories. In this model, the live stream serves as bait. The real revenue flows from traffic manipulation and advertising.\n\n\nIt’s a well-known pattern\n\nThese problems are not isolated observations. A 2026 study published in the Journal of Cybersecurity and Privacy analyzed 260 free live sports streaming sites and found that nearly one in three sites (31.5%) contained malicious JavaScript capable of injecting ads, redirecting users or loading harmful content.\n\nTheir analysis also revealed malware that could install itself, create persistence, and communicate with external command-and-control servers.\n\nInvestigators also identified eight clusters of co-owned domains, including one cluster of 12 different sports streaming sites targeting North American audiences that all shared the same Google AdSense ID. What appear to be separate websites often belong to the same centralized operation.\n\nDuring the study, the number of confirmed phishing redirect URLs increased from 37 to 51, which showed that malicious pages remained active before being flagged by public blacklists.\n\nAlso, in the European Union, a 2023 study found that streaming has become the most popular method to access illicit TV content, with 58 % of piracy in the EU occurring via streaming.\n\n\nWhy children face a higher level of risk\n\nThe danger escalates when minors are involved. A kid searching for “watch cartoons free” or “free football stream” can land on the same piracy infrastructure.\nUnlike licensed streaming platforms, these websites don’t enforce age verification, content segmentation or advertising standards.\n\nKids will get to see banner ads for online gambling and explicit websites often appear directly next to the video player. Some pop-ups open adult pages automatically in new tabs.\n\nSports streams frequently embed betting promotions that normalize gambling behavior and kids getting repeated exposure to this type of messaging might start to believe that it’s normal.\n\nLicensed streaming platforms must comply with child-protection and advertising regulations; these services don’t have the same constraints or even consider the user's age. Because they are so focused on ad revenue, they don’t really care about trivial stuff like age.\n\n\nThe hidden risks of “fully loaded” Android TV boxes\n\nAndroid TV boxes themselves are not inherently unsafe and major and well-known brands ship devices that get security patches, have app-store controls and operate within licensed streaming ecosystems.\n\nThe problem starts with devices marketed as “fully loaded,” “jailbroken,” or “pre-configured with free sports.” For the most part, all of these devices use IPTV (Internet Protocol Television), the technology needed to bring users television content, such as live channels and movies) to your screen, over the internet.\n\nHere’s how one of these boxes look , with Live TV running:\n\nThe device itself promises “Ministra\u002FStalker\u002FXtream\u002FM3U protocols accounts supported”, which, at the very least, it’s ready to be configured with third-party streams; depending on the device, the TV Box might come with everything already enabled.\n\nMany modified Android TV boxes run outdated Android versions that no longer receive security updates. Some sellers disable automatic updates entirely to prevent unofficial apps from breaking. As a result, known vulnerabilities can remain permanently exposed.\n\nUnlike a browser session that ends when a tab closes, a TV box remains continuously connected to the home network. If compromised, it can act as:\n\n * A network foothold inside the home\n * A pivot point to scan other connected devices\n * A passive traffic monitor on the local network\n\n\nBecause these devices connect directly to Wi-Fi routers, any weakness affects more than just streaming quality. It greatly increases the attack surface in any home.\n\nThere is also a supply-chain concern. Many low-cost Android TV boxes are made by generic manufacturers that only care to bring their product to market quickly, with no regard for security.\n\nResearchers have previously identified Android TV boxes preinstalled with malware. The FBI has also issued warnings about this risk.\n\nA device positioned in the living room that’s always on and connected to the network is a much bigger security risk than visiting a website.\n\n\nIs IPTV illegal?\n\nThe IPTV technology itself is legal and many legitimate broadcasters use it to offer their licensed content over the internet.\n\nHowever, streaming copyrighted content without authorization violates copyright law in many countries. Authorities have only recently seized large IPTV networks.\n\nEven when legal consequences do not reach end users, financial risks remain. Subscriber databases can leak and payment details may be stored insecurely, eventually ending up on the Dark Net.\n\n\nThere’s always the torrent problem\n\nWhile free streaming content is the preferred method for users, some will try to find recordings of past sporting events on torrent websites. Our researchers found the LummaStealer malware hidden in popular torrents.\n\nCybercriminals frequently embed malware within popular content that people actively seek, meaning that the higher the profile of a sporting event, the greater the risk associated with related torrent downloads.\n\nFor example, fans searching torrent sites for a recording of a recently concluded F1 race are likely to encounter malicious files disguised as legitimate content.\n\nThe image below shows Bitdefender detections of files users attempted to download, believing they had found the latest Brad Pitt film F1, when in reality the files contained malware.\n\nIn addition to malware risks, some torrent platforms also employ aggressive advertising networks that may display explicit content, creating additional exposure concerns for minors.\n\nIn some cases, torrent sites actively inject malicious code directly into users’ browsers, a tactic observed in several Pirate Bay clones. Without effective endpoint protection, visitors may be exposed to immediate compromise.\n\n\nHow to stream safely\n\n\nYou don’t need to abandon online streaming, but you do need to approach it responsibly.\n\n * Choose licensed platforms that have the distribution rights. These services usually implement advertising standards and parental controls.\n * Enable parental controls on smart TVs, streaming devices and home routers. Activate safe browsing filters where available. Keep devices updated with the latest security patches.\n * Install a reputable security solution that blocks malicious websites, detects infected APK files, prevents phishing redirects and monitors suspicious network activity.\n * Most importantly, talk to children and teens about online risks. “Free” online content often comes with invisible trade-offs.\n\n\n\nFAQ\n\n\nAre free streaming sites dangerous?\n\nYes. Many rely on aggressive ad networks, hidden tracking scripts, and unregulated infrastructure that can expose users to malware, scams, and explicit content.\n\n\nCan IPTV apps infect my device?\n\nUnofficial IPTV apps downloaded from outside trusted app stores may contain trojanized code or request excessive permissions, compromising device security.\n\n\nDo pirate streaming sites track users?\n\nMany embed tracking scripts, such as Google Analytics or Meta Pixel, which can collect browsing data and associate activity with advertising profiles.\n\n\nCan children see gambling or adult content on free streaming sites?\n\nYes. Pirate platforms often display unfiltered betting ads, explicit banners, and pop-ups without age restrictions.\n\n\nWhat is the safest way to watch live sports online?\n\nUse licensed streaming services available in your region and protect all devices with updated security software and parental controls.",tags:[{id:ap,name:W,slug:X,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:u,name:v,slug:w,profile_image:x,cover_image:y,bio:z,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a},{id:aq,name:ar,slug:as,profile_image:at,cover_image:a,bio:au,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:O,url:av},{id:aw,title:ax,slug:ay,feature_image:az,featured:m,published_at:aA,custom_excerpt:a,plaintext:"Scammers waste no time exploiting global crises—and the Israel-Iran conflict is no exception. As news spreads, fraudsters quickly adapt their tactics to create urgency, fear, and emotional appeal. Understanding these crisis-driven scams is key to avoiding costly mistakes.\n\n\nKey Takeaways\n\n * Israel-Iran crisis scams rely on recycled fraud tactics. Scammers use updated “Nigerian prince”-style emails with war-related narratives to make offers seem more believable.\n * Advance-fee fraud is the most common scheme. Victims are promised large sums, donations, or investments but must first send money or personal details.\n * Multiple scam variations target different emotions. These include fake charities, military stories, inheritance claims, and urgent investment opportunities tied to the conflict.\n * Crisis events trigger spikes in phishing and scams. Attackers exploit fear and urgency, leading to a surge in malicious emails and messages during geopolitical instability.\n\n\nHow Israel-Iran Crisis Scams Work and How to Avoid Them\n\nWhenever global tensions escalate, scammers are close by, adapting their pitches.\n\nAs headlines about the Israel\u002FUS-Iran conflict spread across news platforms, inboxes quietly began filling with something else: offers of multi-million-dollar donations, secret political funds, stranded military fortunes, and urgent investment opportunities tied to the war.\n\nWe’ve analyzed several variants already — at least seven distinct versions — all exploiting the same geopolitical crisis. Different characters. Different amounts. Same scam.\n\nAnd what we’re seeing suggests this may be only the beginning.\n\n\nKey Findings\n\n * Bitdefender Antispam Lab researcher Viorel Zavoiu uncovered at least seven distinct scam email variants exploiting the Israel\u002FUS-Iran conflict\n * All samples follow classic advance-fee fraud mechanics, despite their differing storylines\n * The narratives appear recycled from older “Nigerian prince”–style templates, updated with current geopolitical references\n * Execution is sloppy and inconsistent, suggesting an early testing or prototype phase\n * Multiple emotional triggers are being tested, including charity, inheritance, military authority, urgency and investment opportunities\n * We expect the emergence of more refined versions, including fake charity campaigns\n\n\nThe Seven Variations We’ve Identified\n\nThe emails don’t follow a single storyline. Instead, they recycle multiple well-known fraud narratives, inserting references to the conflict to make them feel timely.\n\nAmong the samples analyzed:\n\n * A supposed Powerball winner donating $2.5 million to “randomly selected individuals” to help displaced war victims\n * A terminally ill man writing from his hospital bed, giving away €1.7 million before surgery\n * A “government representative” seeking assistance to relocate $1.9 billion due to instability in Iran\n * A lawyer claiming to represent the family of a deceased Iranian political figure killed in US–Israeli strikes\n * A US Army general needing help moving consignment trunks out of Syria\n * A US Airforce soldier stationed in Iran who allegedly discovered $25.8 million\n * A Tehran-based investor seeking to relocate “huge capital” abroad due to airstrikes\n\nOn the surface, the messages vary widely, but they are all classic advance-fee scams.\n\n\nHere are some of the narratives used:\n\nVersion 1:\n\nHello Friend,\n \nI apologize for intruding on your privacy in this way. I found your name listed in the Trade Centre Chambers of Commerce directory here in Syria. I am pleased to propose a business partnership with you. I only hope that your address is still valid.\n \nI am Major General [redacted], US Army, currently serving with a peacekeeping force in Syria, alongside US intervention troops.\n \nI have two consignment trunks that I want to move out of this war zone to a safe country due to the ongoing conflict between Israel\u002FUSA, and Iran. This is because the U.S. is planning to withdraw about 1,000 remaining troops from Syria after this conflict. I'll provide you with more details when I see your readiness to assist me in receiving and safeguarding them until I return, which is in less than two months.\n \nThanks for your acceptance. God bless you and America!!\n\nVersion 2:\n\nDear Sir\u002FMa,\n\nMy name is [redacted], lawyer to the elder son of late President Ali Hosseini Khamenei (Mr.Meysam khamenei ).It is never a news that his father was called to mother earth 28 February 2026  due US-Israeli strikes.\n\nFor a clear picture, you can view the website below.\n\nWe are urgently in search for a trustworthy person who is ready to stand as a business partner and make claim of secret funds deposited by her late mother who dead three days after her husband with security company in Turkey and he is 100% ready to part with 70% with any interested person.\n\nAt this juncture, I  strongly needed us to act fast, not to lose the funds to top officials of the security company in Turkey who are now raising eyebrows due to the present situation in Iran.\n\nUpon your response, I will be sending you a detailed understanding on this.\nI wait to hear from you.\n\n\nSloppy Execution Suggests a Testing Phase\n\nThe samples we reviewed are riddled with:\n\n * Grammar mistakes\n * Inconsistent identities\n * Timeline errors\n * Contradictions\n * Recycled storylines straight out of early 2000s inheritance-style scam templates\n\nIn some cases, the structure mirrors traditional “foreign official needing help moving funds” scams almost word-for-word, with only the geopolitical context swapped out.\n\nThis sloppiness is telling. It suggests this isn’t yet a polished, large-scale campaign. Instead, it looks like an early testing phase.\n\nFraudsters often push out multiple rough versions of a script to see which narrative generates replies. Once they identify the most effective emotional hook, they refine and scale it. In other words, these seven versions may be prototypes.\n\n\nWhy Use War as a Hook?\n\nConflict creates the perfect emotional environment for fraud:\n\n * People are paying attention\n * News is evolving rapidly\n * Information is fragmented\n * Fear and sympathy are heightened\n * Financial instability feels plausible\n\nBy referencing real events, scammers add just enough realism to anchor an otherwise unrealistic story.\n\n\nWhat Happens If Someone Replies?\n\nThe first email is only the opening move.\n\nOnce a target responds, scammers typically escalate by:\n\n * Requesting personal information\n * Asking for “processing fees,” “clearance charges,” or “tax payments”\n * Introducing fake banks, lawyers, or security companies\n * Demanding shipping costs for ATM cards or “consignment trunks”\n * Grooming victims for prolonged financial exploitation\n\nEven if no money is sent initially, personal data alone can be monetized or used for future attacks.\n\n\nExpect More Versions and Charity Scams\n\nIf history repeats itself, this wave will evolve.\n\nMajor global events and crises have repeatedly triggered waves of fraud that piggyback on real-world suffering and humanitarian goodwill, and we’ve seen this pattern before:\n\n * During the Israel–Gaza conflict, scammers flooded inboxes with fake donation solicitations tied to the war narrative, promising victims could donate or benefit financially while exploiting the humanitarian crisis. Bitdefender documented this trend early on and noted that, as the conflict continued, fraudsters adapted their stories and donation requests to the latest news updates.\n * After the devastating earthquakes in Turkey and Syria, cybercriminals were spotted taking advantage of people’s empathy by posing as charity representatives and asking for donations via fake organizations, just hours after the disaster struck. Our report highlighted how quickly fraudsters began exploiting that crisis and warned that more misleading and fraudulent messages were likely to follow.\n * During the war in Ukraine, Bitdefender Labs tracked increased scam and malicious activity leveraging the conflict, including charity-related phishing, “Nigerian prince”-style advance-fee fraud variations, and attempts to spread malware under the guise of humanitarian requests. Our analysis traced how cybercriminals quickly adapted to real-world events to target netizens’ empathy and trust.\n\nGiven the unpolished nature of the current samples, we expect:\n\n * More refined language\n * Professionally spoofed domains\n * Fake charity websites\n * Social media amplification\n * Better-crafted impersonation of legitimate organizations\n\nWhat we’re seeing now may be the testing stage before broader deployment.\n\n\nThe Red Flags Remain the Same\n\nEven when scammers update the storyline, the fundamentals rarely change:\n\n * Massive sums offered to strangers\n * Unsolicited contact\n * Requests for personal details\n * Emotional manipulation tied to global crises\n * Pressure to act quickly\n\nLegitimate governments, military officials, philanthropists and investors do not randomly email netizens offering millions of dollars.\n\nIf the message sounds like a dramatic war thriller involving secret funds and urgent relocation, it’s almost certainly fiction.\n\n\nHow to Stay Ahead of Crisis-Driven Scams\n\nWhen major world events dominate the news, assume scammers are adapting.\n\nA few practical rules help:\n\nSlow down when urgency is used as leverage.\nWar-based narratives are designed to override rational thinking.\n\nNever share personal details with unknown contacts.\nEven a simple reply confirms your email is active and monitored.\n\nVerify independently.\nIf an email references breaking events, check trusted news outlets yourself.\n\nUse tools that analyze suspicious messages.\nIf you’re unsure, free services like Bitdefender Scamio can help evaluate suspicious messages before you engage.\n\n\nFrequently asked questions (FAQ)\n\n\nWhat are 5 of the most current scams?\n\nFive of the most current scams include:\n\n * Investment scams (especially high-return promises)\n * Phishing and smishing attacks (emails and text messages)\n * AI impersonation scams (voice cloning and deepfakes)\n * Job and task scams (fake remote work offers)\n * Online shopping scams (fake stores and counterfeit goods)\n\nGlobally, shopping, investment, and “unexpected money” scams are among the most common.\n\n\nWhat are the top 10 scams?\n\nThe most widespread scams today include:\n\n * Phishing emails and fake login pages\n * Investment scams\n * Romance scams\n * Job and task scams\n * Online shopping scams\n * Tech support scams\n * Impersonation scams (banks, government, companies)\n * Prize and lottery scams\n * Subscription\u002Frenewal scams\n * AI voice and deepfake scams\n\nThese scams often combine social engineering with new technologies like AI.\n\n\nWhat are the biggest scams in the world?\n\nThe biggest scams globally are typically investment scams, impersonation scams, and large-scale online fraud operations. Investment scams alone generate billions in losses annually, with crypto-related fraud accounting for a major share of global scam revenue.\n\nOverall, scams cause hundreds of billions in losses worldwide each year, making them a major global cybercrime issue.\n\n\nWhat are the top 5 scamming countries?\n\nThere is no official “top 5” list, but global reports and investigations frequently link large-scale scam operations to regions such as:\n\n * Nigeria (advance-fee and romance scams)\n * India (tech support and call center scams)\n * China (phishing, counterfeit, and large fraud networks)\n * Russia (cybercrime and phishing operations)\n * Southeast Asia (Cambodia, Myanmar, Laos) (organized scam compounds)\n\nThese regions are often mentioned due to organized scam networks, though scams originate worldwide and are not limited to specific countries.",tags:[{id:B,name:C,slug:D,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:aB,name:P,slug:P,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:n,name:o,slug:p,profile_image:q,cover_image:a,bio:r,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:aC,url:aD}],postsWhite:[{id:aE,title:aF,slug:aG,feature_image:aH,featured:c,published_at:aI,custom_excerpt:Q,html:aJ,authors:[{id:u,name:v,slug:w,profile_image:x,cover_image:y,bio:z,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:Q,reading_time:k,url:aK},{id:aL,title:aM,slug:aN,feature_image:aO,featured:c,published_at:aP,custom_excerpt:a,html:aQ,authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:aR,name:aS,slug:aT,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:aU,reading_time:k,url:aV},{id:aW,title:aX,slug:aY,feature_image:aZ,featured:c,published_at:a_,custom_excerpt:a,html:a$,authors:[{id:ba,name:bb,slug:bc,profile_image:bd,cover_image:a,bio:be,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:bf,reading_time:k,url:bg}],postsBlack:[{id:"69fa10e92fa53a9f2eef6d23",title:"Instructure confirms breach; millions of Canvas users potentially impacted",slug:"canvas-data-breach-2026",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInstructure-confirms-breach--millions-of-Canvas-users-potentially-impacted.png",featured:c,published_at:"2026-05-05T18:56:05.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EInstructure, the company behind the Canvas learning management system, has confirmed a data breach after a well-known cybercrime group claimed responsibility for stealing data linked to hundreds of millions of users.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003ECanvas owner Instructure confirmed a security incident after the ShinyHunters group claimed responsibility\u003C\u002Fli\u003E\u003Cli\u003EUp to 275 million users may be affected, with exposed data including names, emails, IDs, and messages\u003C\u002Fli\u003E\u003Cli\u003EUsers should watch for scams and suspicious messages, even if they haven’t received an official notification yet\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"the-security-incident-and-exposed-data\"\u003EThe security incident and exposed data\u003C\u002Fh2\u003E\u003Cp\u003ESchools, universities, and other organizations use Canvas to manage coursework, communication, and student records, making it a particularly attractive target for attackers.\u003C\u002Fp\u003E\u003Cp\u003EThe breach came to light after the \u003Cstrong\u003EShinyHunters\u003C\u002Fstrong\u003E extortion group listed Instructure on its leak site, claiming it had stolen data from the company’s systems. According to Bleeping Computer, the breach could affect up to \u003Cstrong\u003E275 million individuals across nearly 9,000 schools worldwide\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cp\u003EInstructure confirmed the cybersecurity incident on May 2\u003Csup\u003E \u003C\u002Fsup\u003Eon their official website.\u003C\u002Fp\u003E\u003Cp\u003E“We are providing an update on the security incident we advised you of yesterday. While our investigation continues alongside our outside forensics experts, at this stage we believe the incident has been contained,” the company\u003Ca href=\"https:\u002F\u002Fstatus.instructure.com\u002F\" rel=\"noreferrer\"\u003E said\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003ESo far, Instructure says the exposed information only includes names, email addresses, student ID numbers and messages between users.\u003C\u002Fp\u003E\u003Cp\u003EThe company said there is \u003Cstrong\u003Eno evidence (for now)\u003C\u002Fstrong\u003E that highly sensitive data such as passwords, financial details, or government identifiers were compromised.\u003C\u002Fp\u003E\u003Cp\u003E“While we continue actively investigating, thus far, indications are that the information involved consists of certain identifying information of users at affected institutions, such as names, email addresses, and student ID numbers, as well as messages among users,” Instructure explained. “At this time, we have found no evidence that passwords, dates of birth, government identifiers, or financial information were involved. If that changes, we will notify any impacted institutions. “\u003C\u002Fp\u003E\u003Ch2 id=\"what-has-instructure-done-so-far\"\u003EWhat has Instructure done so far?\u003C\u002Fh2\u003E\u003Cp\u003EIn response to the incident, Instructure says it has:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EDeployed security patches\u003C\u002Fli\u003E\u003Cli\u003EIncreased system monitoring\u003C\u002Fli\u003E\u003Cli\u003ERotated application keys\u003C\u002Fli\u003E\u003Cli\u003ERequired customers to reauthorize API access\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThe company is also working with cybersecurity experts and law enforcement as the investigation continues.\u003C\u002Fp\u003E\u003Ch2 id=\"what-should-users-do-now\"\u003EWhat should users do now?\u003C\u002Fh2\u003E\u003Cp\u003EEven if the full scope of the breach remains unclear, users and institutions should act with caution and proactively.\u003C\u002Fp\u003E\u003Cp\u003EHere are a few immediate steps worth taking:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ECheck if your institution has issued a notice\u003C\u002Fstrong\u003E\u003Cbr\u003EUniversities and schools are typically responsible for notifying affected users.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBe mindful of suspicious messages\u003C\u002Fstrong\u003E\u003Cbr\u003EExposed email addresses can quickly be used in targeted scams, crafting messages that appear to come from your school, teachers, or classmates. These messages may reference real classes, conversations, or deadlines to feel more convincing. Be cautious about any unexpected requests, especially if they ask you to click links, download files, or share sensitive information. If something seems unusual, verify it independently by contacting the sender through an official channel, not by replying directly to the message.\u003Cbr\u003EAdditionally, you can double-check it with \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003EBitdefender Scamio\u003C\u002Fa\u003E, our free scam detector. For links, use the \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\"\u003EBitdefender Link Checker\u003C\u002Fa\u003E to see if a URL is safe before clicking.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EUpdate passwords (even if not exposed)\u003C\u002Fstrong\u003E\u003Cbr\u003EIt’s a good precaution, especially if you reuse passwords across platforms.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EMonitor your digital footprint\u003C\u002Fstrong\u003E\u003Cbr\u003EServices like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fdigital-identity-protection\" rel=\"noreferrer\"\u003EBitdefender Digital Identity Protection\u003C\u002Fa\u003E help track whether your data appears in known data breaches and alert you early if your information is exposed. It continuously monitors your digital footprint, including email addresses and other personal data, and notifies you if it shows up in newly leaked databases. This kind of early warning allows you to be proactive in changing your passwords, securing accounts, and reducing the risk of follow-up attacks like phishing or identity theft.\u003C\u002Fp\u003E",tags:[{id:R,name:S,slug:T,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:E,name:s,slug:F,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:n,name:o,slug:p,profile_image:q,cover_image:a,bio:r,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:"Instructure, the company behind the Canvas learning management system, has confirmed a data breach after a well-known cybercrime group claimed responsibility for stealing data linked to hundreds of millions of users.\n\n\nKey takeaways\n\n * Canvas owner Instructure confirmed a security incident after the ShinyHunters group claimed responsibility\n * Up to 275 million users may be affected, with exposed data including names, emails, IDs, and messages\n * Users should watch for scams and suspicious mess",reading_time:bh,url:"\u002Fblog\u002Fhotforsecurity\u002Fcanvas-data-breach-2026\u002F"},{id:"69f870982fa53a9f2eef6b84",title:"Stalkerware data leak exposes private screenshots linked to celebrities and influencers",slug:"stalkerware-data-leak-screenshots-celebrities-exposed",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FStalkerware-data-leak-exposes-private-screenshots-linked-to-celebrities-and-influencers.png",featured:c,published_at:"2026-05-04T13:28:18.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EA recent discovery by cybersecurity researcher Jeremiah Fowler shows how quickly a single compromised device can fuel a much larger exposure.\u003C\u002Fp\u003E\u003Cp\u003EAn unsecured database containing tens of thousands of screenshots, reportedly collected through stalkerware, was found openly accessible online. While the data traces back to a single infected device, the screenshots reveal interactions with celebrities, influencers, and media figures, highlighting how a breach can ripple outward.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EAn exposed stalkerware database leaked over 80,000 screenshots from a single compromised device linked to a European public figure\u003C\u002Fli\u003E\u003Cli\u003EScreenshots capture conversations, context, and everyone involved\u003C\u002Fli\u003E\u003Cli\u003EA single breach can unintentionally expose celebrities, influencers, and entire contact networks\u003C\u002Fli\u003E\u003Cli\u003EOnce exposed, this type of data can be used for targeted scams, impersonation, or fraud\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"what-did-the-leak-contain\"\u003EWhat did the leak contain?\u003C\u002Fh2\u003E\u003Cp\u003EAccording to the \u003Ca href=\"https:\u002F\u002Fwww.expressvpn.com\u002Fblog\u002Fcelebrities-stalkerware-data-exposed\u002F\" rel=\"noreferrer\"\u003Eanalysis\u003C\u002Fa\u003E, the exposed database contained 86,859 image screenshots, offering a detailed view of the victims' private and professional lives.\u003C\u002Fp\u003E\u003Cp\u003EThe data included conversations from messaging apps and social media accounts (Facebook, WhatsApp, Instagram, and TikTok), personal photos, video calls, contact lists, and even business-related documents. Some of the screenshots exposed contact information like phone numbers and emails alongside other identifications.\u003C\u002Fp\u003E\u003Cp\u003E“Upon further review of the exposed files, I identified that the victim of the spyware is a prominent European celebrity, entrepreneur, and media personality,” Fowler said. “The images capture chat conversations with influencers that have millions of followers, as well as with friends, family, business associates, and others.”\u003C\u002Fp\u003E\u003Ch2 id=\"a-different-kind-of-exposure\"\u003EA different kind of exposure\u003C\u002Fh2\u003E\u003Cp\u003EWhat makes this case particularly troubling is how the data was collected.\u003C\u002Fp\u003E\u003Cp\u003EStalkerware is already invasive by design, but incidents like this show how things can escalate.\u003C\u002Fp\u003E\u003Cp\u003EThese tools don’t just collect data; they centralize it. Messages, photos, location data, and more is stored somewhere else, often on poorly secured servers. When those systems are misconfigured or exposed, the damage doesn’t stay contained.\u003C\u002Fp\u003E\u003Cp\u003ETake this real-life example, where only one device was compromised, but the number of affected individuals is much higher. The captured conversation revealed the private communication of one individual with influencers, celebrities, models, and even “what appeared to be intimate, romantic exchanges” according to the researcher.\u003C\u002Fp\u003E\u003Ch2 id=\"what-stalkerware-can-actually-do\"\u003EWhat stalkerware can actually do\u003C\u002Fh2\u003E\u003Cp\u003EAt its core, \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fwhat-is-stalkerware-and-what-can-you-do-to-stay-safe\" rel=\"noreferrer\"\u003Estalkerware\u003C\u002Fa\u003E is a form of spyware used for covert monitoring. It can read messages, track location, access photos, and in some cases, activate the microphone or camera.\u003C\u002Fp\u003E\u003Cp\u003EIt’s often installed by someone with physical access to the device, which makes it particularly dangerous in personal or trust-based situations.\u003C\u002Fp\u003E\u003Cp\u003EBecause it operates quietly in the background, detection isn’t always straightforward.\u003C\u002Fp\u003E\u003Cp\u003EWarning signs can include unusual battery drain, increased data usage, or a device that suddenly behaves differently. None of these signs are definitive on their own though.\u003C\u002Fp\u003E\u003Cp\u003EExposed datasets like this create more than just privacy concerns.\u003C\u002Fp\u003E\u003Cp\u003EIf accessed by malicious actors, the information could be used to build highly convincing scams or impersonation attempts. Attackers don’t need to guess when they already have context, conversations, and relationships mapped out.\u003C\u002Fp\u003E\u003Cp\u003EThey can reference real interactions, impersonate trusted contacts, or craft messages that feel legitimate. For public figures, creators, or professionals, this can quickly turn into account takeovers, reputational damage, or financial fraud.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-stay-safe-from-this-type-of-exposure-and-protect-against-stalkerware-or-spyware\"\u003EHow to stay safe from this type of exposure and protect against stalkerware or spyware\u003C\u002Fh2\u003E\u003Cp\u003EStaying safe from stalkerware or spyware often starts with the basics. Keep your device updated, avoid installing apps from untrusted sources, and be mindful of who has physical access to your device. Even brief access can be enough to install monitoring software. A trusted \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fpremium-security\" rel=\"noreferrer\"\u003Esecurity solution\u003C\u002Fa\u003E that can detect and block spyware is just as important, especially since these threats are designed to hide.\u003C\u002Fp\u003E\u003Cp\u003EIf something feels off, like unusual battery drain or unexpected behavior, it’s worth taking a closer look.\u003C\u002Fp\u003E\u003Cp\u003EOne of the biggest challenges with incidents like this is visibility. Most people don’t know where their data ends up or how much of it is already exposed.\u003C\u002Fp\u003E\u003Cp\u003EWith \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fdigital-identity-protection\" rel=\"noreferrer\"\u003E\u003Cstrong\u003EBitdefender Digital Identity Protection\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, you can monitor your digital footprint and receive alerts if your personal information appears in breaches or exposed databases. It gives you a clearer picture of what’s out there and helps you act before things escalate.\u003C\u002Fp\u003E\u003Cp\u003EFor creators and influencers, protecting accounts and devices is just as important. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fsecurity-for-creators\" rel=\"noreferrer\"\u003E\u003Cstrong\u003EBitdefender Security for Creators\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E helps safeguard both, reducing the risk of unauthorized access that can lead to incidents like this.\u003C\u002Fp\u003E",tags:[{id:R,name:S,slug:T,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:E,name:s,slug:F,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:n,name:o,slug:p,profile_image:q,cover_image:a,bio:r,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:"A recent discovery by cybersecurity researcher Jeremiah Fowler shows how quickly a single compromised device can fuel a much larger exposure.\n\nAn unsecured database containing tens of thousands of screenshots, reportedly collected through stalkerware, was found openly accessible online. While the data traces back to a single infected device, the screenshots reveal interactions with celebrities, influencers, and media figures, highlighting how a breach can ripple outward.\n\n\nKey takeaways\n\n * An e",reading_time:k,url:"\u002Fblog\u002Fhotforsecurity\u002Fstalkerware-data-leak-screenshots-celebrities-exposed\u002F"},{id:"69ef689f2fa53a9f2eef67e1",title:"Hackers claim to have breached Udemy, stealing 1.4 million user records",slug:"hackers-claim-to-have-breached-udemy",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F04\u002FHackers-claim-to-have-breached-Udemy--stealing-1.4-million-user-records--2-.jpg",featured:c,published_at:"2026-04-27T16:52:11.000+03:00",custom_excerpt:a,html:"\u003Cp\u003ENotorious hacking group ShinyHunters recently\u003Cstrong\u003E \u003C\u002Fstrong\u003Eannounced they had breached Udemy’s systems and exfiltrated a large dataset of user information.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways:\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EHackers claim to have stolen 1.4 million Udemy user records\u003C\u002Fli\u003E\u003Cli\u003EThe company has not confirmed the breach\u003C\u002Fli\u003E\u003Cli\u003EStolen information may include personal and internal data\u003C\u002Fli\u003E\u003Cli\u003E Attackers are using a “pay or leak” extortion tactic\u003C\u002Fli\u003E\u003Cli\u003EUsers should update passwords, enable 2FA, and watch out for scams\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"what-happened\"\u003EWhat happened?\u003C\u002Fh2\u003E\u003Cp\u003EOn April 24, 2026, the cybercriminal group \u003Cstrong\u003EShinyHunters\u003C\u002Fstrong\u003E issued a \u003Cstrong\u003E“pay or leak” ultimatum\u003C\u002Fstrong\u003E, warning Udemy that they had breached their systems and that over 1.4 million records, including internal corporate data, would be made public if their demands were not met.\u003C\u002Fp\u003E\u003Cp\u003E“Over 1.4M records containing PII and other internal corporate data have been compromised. Pay or Leak,” ShinyHunters said on their leak site. “This is a final warning to reach out by 27 Apr 2026 before we leak, along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline.”\u003C\u002Fp\u003E\u003Ch2 id=\"what-data-was-allegedly-exposed\"\u003EWhat data was allegedly exposed?\u003C\u002Fh2\u003E\u003Cp\u003EAccording to Haveibeenpwned, the breach includes an extensive dataset. The reportedly compromised data may include:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EEmail addresses\u003C\u002Fli\u003E\u003Cli\u003EFull names\u003C\u002Fli\u003E\u003Cli\u003EPhone numbers\u003C\u002Fli\u003E\u003Cli\u003EPhysical addresses\u003C\u002Fli\u003E\u003Cli\u003EEmployers\u003C\u002Fli\u003E\u003Cli\u003EJob titles\u003C\u002Fli\u003E\u003Cli\u003EPayment method information\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EAt the time of writing, the breach remains \u003Cstrong\u003Eunconfirmed by Udemy\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cp\u003EIf the data is legitimate, exposed information could be used in targeted phishing campaigns, credential stuffing attacks on other platforms, and account takeover attempts.\u003C\u002Fp\u003E\u003Ch2 id=\"what-should-udemy-users-do\"\u003EWhat should Udemy users do?\u003C\u002Fh2\u003E\u003Cp\u003EEven though the breach is still unconfirmed, it’s a good time to double-check your security.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EStart with the basics and update your passwords\u003C\u002Fstrong\u003E. If you’ve used your Udemy password elsewhere, change it and don’t forget to enable 2FA, which adds an extra barrier that can stop many automated attacks.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBe cautious with incoming messages. \u003C\u002Fstrong\u003EExpect phishing attempts that reference courses, certificates, or account issues. Use free scam detection tools like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\" rel=\"noreferrer\"\u003EScamio\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\" rel=\"noreferrer\"\u003ELink Checker\u003C\u002Fa\u003E to verify suspicious links before interacting.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAnd finally, keep an eye out for potentially exposed data. \u003C\u002Fstrong\u003EServices like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fdigital-identity-protection\" rel=\"noreferrer\"\u003E\u003Cstrong\u003EBitdefender Digital Identity Protection\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E are designed for exactly this kind of situation.\u003C\u002Fp\u003E\u003Cp\u003EEven if this breach claims turns out to be false, the service continuously monitor for your personal data across known leaks. If your information does surface in a confirmed breach, you’ll get \u003Cstrong\u003Ereal-time alerts and clear steps to secure your identity\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E",tags:[{id:R,name:S,slug:T,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:E,name:s,slug:F,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:n,name:o,slug:p,profile_image:q,cover_image:a,bio:r,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:"Notorious hacking group ShinyHunters recently announced they had breached Udemy’s systems and exfiltrated a large dataset of user information.\n\n\nKey takeaways:\n\n * Hackers claim to have stolen 1.4 million Udemy user records\n * The company has not confirmed the breach\n * Stolen information may include personal and internal data\n * Attackers are using a “pay or leak” extortion tactic\n * Users should update passwords, enable 2FA, and watch out for scams\n\n\nWhat happened?\n\nOn April 24, 2026, the cybe",reading_time:bh,url:"\u002Fblog\u002Fhotforsecurity\u002Fhackers-claim-to-have-breached-udemy\u002F"},{id:"69ea01cf2fa53a9f2eef6651",title:"Rituals data breach exposes customer details",slug:"rituals-cosmetics-data-breach-2026",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F04\u002FRituals-data-breach-exposes-customer-details.jpg",featured:c,published_at:"2026-04-23T14:36:22.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EDutch cosmetics brand Rituals has confirmed customer membership records were affected in a data breach. While no passwords or payment details were exposed, the type of data involved raises a different kind of risk that many users underestimate.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EDutch cosmetics giant Rituals suffered a data breach in April 2026 affecting customer membership records\u003C\u002Fli\u003E\u003Cli\u003EExposed data may include names, emails, phone numbers, birth dates, and home addresses\u003C\u002Fli\u003E\u003Cli\u003ENo passwords or payment details were compromised\u003C\u002Fli\u003E\u003Cli\u003EThe breach has been contained, with no evidence of public data leaks so far\u003C\u002Fli\u003E\u003Cli\u003EEven without financial data, exposed personal details can be used in targeted phishing scams\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"what-happened-in-the-rituals-data-breach\"\u003EWhat happened in the Rituals data breach?\u003C\u002Fh2\u003E\u003Cp\u003EAccording to a \u003Ca href=\"https:\u002F\u002Fwww.rituals.com\u002Fen-gb\u002Ffaq\u002Fdata\u002F\"\u003Edata breach notice\u003C\u002Fa\u003E on the Rituals website, an unauthorized party exfiltrated part of its customer database in April 2026. The incident was detected and contained quickly, with the company stating that it acted immediately to stop the access.\u003C\u002Fp\u003E\u003Cp\u003EThe breach affected data associated with its “My Rituals” membership program, which many customers use for perks such as discounts and birthday gifts.\u003C\u002Fp\u003E\u003Cp\u003EThe exposed data may include:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EFull name\u003C\u002Fli\u003E\u003Cli\u003EEmail address\u003C\u002Fli\u003E\u003Cli\u003EPhone number\u003C\u002Fli\u003E\u003Cli\u003EDate of birth\u003C\u002Fli\u003E\u003Cli\u003EGender\u003C\u002Fli\u003E\u003Cli\u003EHome address\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ERituals emphasized that \u003Cstrong\u003Eno passwords or payment information were accessed\u003C\u002Fstrong\u003E, and there is currently no evidence that the data has been publicly leaked.\u003C\u002Fp\u003E\u003Cp\u003EAffected users have been notified, and authorities have been informed as part of an ongoing investigation.\u003C\u002Fp\u003E\u003Ch2 id=\"why-this-breach-still-matters\"\u003EWhy this breach still matters \u003C\u002Fh2\u003E\u003Cp\u003EAt first glance, this might sound like a “low-risk” breach. No passwords. No credit cards. No immediate financial fraud.\u003C\u002Fp\u003E\u003Cp\u003EBut from a scammer’s perspective, this kind of data is very valuable.\u003C\u002Fp\u003E\u003Cp\u003EIf someone has your full name and contact information (email and phone number) plus your date of birth, they can easily craft messages that feel personal and trustworthy.\u003C\u002Fp\u003E\u003Cp\u003EInstead of a generic phishing email, you might receive something like:\u003C\u002Fp\u003E\u003Cp\u003E“Hi [Your Name], your Rituals birthday gift is waiting. Claim it here.”\u003C\u002Fp\u003E\u003Cp\u003EAnd Rituals-themed scams are not new. The company has already had to state publicly that previous “birthday gift” messages circulating online were not legitimate. Even if those scams were unrelated, a breach like this makes future impersonation attempts far more convincing.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-stay-safe\"\u003EHow to stay safe\u003C\u002Fh2\u003E\u003Cp\u003ERituals says no immediate action is required, but alertness is essential in the weeks and months ahead.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EBe skeptical of messages that feel “too personal”\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf an email or SMS includes your real name, birthday, or other details, don’t assume it is legitimate. That information may already be in circulation.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EUpdate your passwords as a precaution\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EEven though Rituals confirmed that no passwords were exposed, it’s still a good idea to review your login security.\u003C\u002Fp\u003E\u003Cp\u003EIf you reuse passwords across multiple accounts, one breach elsewhere could put you at risk. Updating your passwords, especially for accounts linked to your email address, helps reduce that exposure.\u003C\u002Fp\u003E\u003Cp\u003EUse strong, unique passwords for each account. If you’re not sure where to start, you can generate secure ones with \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fpassword-generator\"\u003E\u003Cstrong\u003EBitdefender Password Generator\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E.\u003C\u002Fstrong\u003E\u003Cbr\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ECheck links before you click\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EIf you receive a suspicious offer or message, run the link through \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\"\u003E\u003Cstrong\u003EBitdefender Link Checker\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E. It can quickly tell you if a URL is safe or potentially malicious.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EUse a scam detector to verify suspicious messages\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ENot sure if something is a scam? Drop the message into \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003E\u003Cstrong\u003EBitdefender Scamio\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E.\u003Cbr\u003EIt helps you figure out, in seconds, whether you are dealing with a phishing attempt.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EUse\u003C\u002Fstrong\u003E \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fdigital-identity-protection\"\u003E\u003Cstrong\u003EBitdefender Digital Identity Protection\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E to monitor your digital footprint and stay on top of data breaches.\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EWith our tool you can:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESee if your data appears in breaches or online databases\u003C\u002Fli\u003E\u003Cli\u003EGet alerts if it shows up on the dark web\u003C\u002Fli\u003E\u003Cli\u003EUnderstand how exposed your personal information really is\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Cstrong\u003EWatch beyond your inbox\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EPhishing is no longer just email. Be cautious with:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EText messages\u003C\u002Fli\u003E\u003Cli\u003EPhone calls\u003C\u002Fli\u003E\u003Cli\u003ESocial media DMs\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EIf something feels urgent or pushes you to act quickly, take a step back and verify it through official channels.\u003C\u002Fp\u003E",tags:[{id:R,name:S,slug:T,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:E,name:s,slug:F,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:n,name:o,slug:p,profile_image:q,cover_image:a,bio:r,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:"Dutch cosmetics brand Rituals has confirmed customer membership records were affected in a data breach. While no passwords or payment details were exposed, the type of data involved raises a different kind of risk that many users underestimate.\n\n\nKey takeaways\n\n * Dutch cosmetics giant Rituals suffered a data breach in April 2026 affecting customer membership records\n * Exposed data may include names, emails, phone numbers, birth dates, and home addresses\n * No passwords or payment details were ",reading_time:k,url:"\u002Fblog\u002Fhotforsecurity\u002Frituals-cosmetics-data-breach-2026\u002F"}],tagWhiteDetail:{slug:j,id:h,name:i,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a,url:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Ftag\u002Findustry-news\u002F"},tagBlackDetail:{slug:F,id:E,name:s,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a,url:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Ftag\u002Fdigital-privacy\u002F"},settings:{title:Y,description:bi,logo:bj,icon:a,accent_color:bk,cover_image:bl,facebook:bm,twitter:bn,lang:d,locale:d,timezone:bo,codeinjection_head:a,codeinjection_foot:a,navigation:[{label:bp,url:Z},{label:bq,url:br},{label:s,url:bs},{label:N,url:bt},{label:bu,url:bv},{label:G,url:bw}],secondary_navigation:[],meta_title:a,meta_description:a,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,members_support_address:bx,members_enabled:c,allow_self_signup:c,members_invite_only:c,paid_members_enabled:c,firstpromoter_account:a,portal_button_style:by,portal_button_signup_text:bz,portal_button_icon:a,portal_signup_terms_html:a,portal_signup_checkbox_required:c,portal_plans:[bA,bB,U],portal_default_plan:U,portal_name:m,portal_button:c,comments_enabled:bC,recommendations_enabled:c,outbound_link_tagging:c,default_email_address:bD,support_email_address:bE,editor_default_email_recipients:bF,labs:{},url:bG,version:bH},allBiTags:[]}],fetch:{"BlogMenu:0":{settings:{title:Y,description:bi,logo:bj,icon:a,accent_color:bk,cover_image:bl,facebook:bm,twitter:bn,lang:d,locale:d,timezone:bo,codeinjection_head:a,codeinjection_foot:a,navigation:[{label:bp,url:Z},{label:bq,url:br},{label:s,url:bs},{label:N,url:bt},{label:bu,url:bv},{label:G,url:bw}],secondary_navigation:[],meta_title:a,meta_description:a,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,members_support_address:bx,members_enabled:c,allow_self_signup:c,members_invite_only:c,paid_members_enabled:c,firstpromoter_account:a,portal_button_style:by,portal_button_signup_text:bz,portal_button_icon:a,portal_signup_terms_html:a,portal_signup_checkbox_required:c,portal_plans:[bA,bB,U],portal_default_plan:U,portal_name:m,portal_button:c,comments_enabled:bC,recommendations_enabled:c,outbound_link_tagging:c,default_email_address:bD,support_email_address:bE,editor_default_email_recipients:bF,labs:{},url:bG,version:bH},blogNames:bI,blogTitles:{hotforsecurity:Y,labs:"Labs",businessinsights:"Business Insights",cyberpedia:"Cyberpedia"},blogRegions:{hotforsecurity:[d,"ro","de",bJ,"es"],labs:[d],businessinsights:[d,bJ],cyberpedia:[d]},activeBlog:_,blogFound:_},"FilterSection:0":{posts:[{id:"69fdf4812fa53a9f2eef7011",title:"FBI warns of rising bank spoofing calls as scam callers drain accounts and nearly fool ABC7 anchor",slug:"fbi-warning-bank-spoofing-calls-drain-accounts",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FFBI-warns-of-rising-bank-spoofing-calls-as-scam-callers-drain-accounts-and-nearly-fool-ABC7-anchor.jpg",featured:c,published_at:"2026-05-08T19:27:07.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EA recent ABC7 Chicago investigation reveals how sophisticated banking spoofing scams are draining victims’ accounts, with criminals impersonating banks, Zelle representatives, and even federal agents. The scam is so convincing that it nearly fooled ABC7 anchor Rob Elgas, highlighting just how far such operations have evolved.\u003C\u002Fp\u003E\u003Cp\u003EAnd this isn’t happening in isolation. The FBI has recently warned that spoofing and impersonation scams are on the rise, with criminals increasingly posing as banks and government agencies to pressure victims into moving their own money into “safe” accounts controlled by attackers.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003ECaller ID can be faked. Scammers can spoof legitimate bank phone numbers to appear trustworthy.\u003C\u002Fli\u003E\u003Cli\u003EBanks will never ask you to move money to “protect” it.\u003C\u002Fli\u003E\u003Cli\u003EVictims lost thousands of dollars through Zelle and bank transfers for believing they were speaking to fraud investigators.\u003C\u002Fli\u003E\u003Cli\u003EThe FBI says phishing and spoofing scams were the most reported IC3 complaint category in 2025, with more than 191,000 complaints and over $215 million in reported losses.\u003C\u002Fli\u003E\u003Cli\u003EMobile scam protection tools and independent verification can help stop fraud before money is lost.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"a-chase-customer-lost-40000-after-seeing-the-real-bank-number\"\u003EA Chase customer lost $40,000 after seeing the real bank number\u003C\u002Fh2\u003E\u003Cp\u003EThe scam recently made headlines after ABC7 Chicago investigated several incidents involving Chase and Huntington Bank customers who lost thousands of dollars. Even veteran ABC7 anchor Rob Elgas nearly became a victim himself.\u003C\u002Fp\u003E\u003Cp\u003EAccording to the news outlet, a woman from Illinois got a call that looked like it came directly from Chase’s fraud department.\u003C\u002Fp\u003E\u003Cp\u003E“The first call I got, it was the number on the back of my Chase debit card,” she told \u003Ca href=\"https:\u002F\u002Fabc7chicago.com\u002Fpost\u002Fbanking-spoof-scam-call-incidents-drain-chase-bank-huntington-customers-accounts-fool-abc7-chicago-anchor-rob-elgas\u002F19039898\u002F\" rel=\"noreferrer\"\u003EABC7\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EThe scammers sounded convincing because they already had sensitive details about her account. According to the report, they knew her account number and balance “down to the penny.” They also pretended to involve the FBI, even providing fake agent or badge numbers.\u003C\u002Fp\u003E\u003Cp\u003EThe criminals claimed Chase employees were illegally accessing customer accounts and instructed her to move her money into a supposedly “secure” account for protection.\u003C\u002Fp\u003E\u003Cp\u003EBelieving she was protecting her savings, the woman transferred nearly $40,000. The money was gone by the next day.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAnother Victim Was Told to ‘Upgrade’ Her Zelle Account\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAnother customer received a spoofed call from someone claiming to work with Zelle and Huntington Bank.\u003C\u002Fp\u003E\u003Cp\u003EThe caller told her she needed to upgrade to a Zelle business account to continue receiving payments. Because the scammer already had some of her banking information, the story sounded believable.\u003C\u002Fp\u003E\u003Cp\u003EShe was ultimately persuaded to send $5,000 through Zelle to keep the money “safe.”\u003C\u002Fp\u003E\u003Cp\u003ELike many authorized transfer scam victims, she reportedly received no reimbursement because she technically approved the transaction herself.\u003C\u002Fp\u003E\u003Ch2 id=\"even-abc7-anchor-rob-elgas-nearly-sent-the-money\"\u003EEven ABC7 anchor Rob Elgas nearly sent the money\u003C\u002Fh2\u003E\u003Cp\u003EABC7 anchor Rob Elgas said he spent 34 minutes on the phone with scammers posing as Chase representatives.\u003C\u002Fp\u003E\u003Cp\u003EThe fraudsters instructed him to send an “employee FDIC inspector number” through Zelle to supposedly secure his account. In reality, the “employee number” was actually a dollar amount disguised as a payment request.\u003C\u002Fp\u003E\u003Cp\u003EElgas said he only realized something was wrong at the final moment when the Zelle screen displayed a payment amount instead of an employee identifier.\u003C\u002Fp\u003E\u003Cp\u003E\"And immediately when I saw the dollar amount in the Zelle payment, I knew I nearly got scammed,” Elgas said.\u003C\u002Fp\u003E\u003Ch2 id=\"why-bank-spoofed-calls-are-so-dangerous\"\u003EWhy bank spoofed calls are so dangerous\u003C\u002Fh2\u003E\u003Cp\u003EAccording to the FBI, scammers often gather personal and banking information through data breaches, phishing campaigns, malware infections, stolen databases, or information sold on dark web marketplaces. Some criminals may also abuse automated banking systems to verify balances and recent transactions, helping them sound legitimate during calls.\u003C\u002Fp\u003E\u003Cp\u003EWhat makes these scams especially dangerous is the combination of caller ID spoofing using legitimate bank phone numbers, government or authority impersonation, detailed account knowledge as well as pressure to act quickly.\u003C\u002Fp\u003E\u003Cp\u003ERobert Richardson, a special agent with the FBI Chicago Field Office, explained that victims are often rushed into making decisions while emotionally overwhelmed.\u003C\u002Fp\u003E\u003Cp\u003EThe FBI has warned separately that scammers are increasingly impersonating federal agents and collaborating with fake bank representatives to steal money and sensitive information from victims.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-stay-safe-from-bank-spoofing-calls\"\u003EHow to stay safe from bank spoofing calls\u003C\u002Fh2\u003E\u003Cp\u003EThe safest thing you can do during an unexpected banking call is slow the conversation down and verify independently.\u003C\u002Fp\u003E\u003Cp\u003EHere are some important ways to protect yourself:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003ENever trust caller ID alone.\u003C\u002Fstrong\u003E Scammers can spoof legitimate bank phone numbers, including the number on the back of your debit card.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EHang up and call back yourself.\u003C\u002Fstrong\u003E If someone claims to be from your bank, end the call and dial the official number directly from your banking app or card.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ENever move money to a “safe” account.\u003C\u002Fstrong\u003E Legitimate banks and the FBI never ask you to transfer money through Zelle, wire transfers, crypto, or gift cards to “protect” your funds.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EDon’t share verification codes or passwords.\u003C\u002Fstrong\u003E Fraudsters often try to steal one-time passcodes to take over accounts in real time.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EWatch for pressure tactics.\u003C\u002Fstrong\u003E Scammers often create fake emergencies involving fraud alerts, account freezes, or criminal investigations.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EProtect your phone first.\u003C\u002Fstrong\u003E Scam calls, phishing texts, and malicious links increasingly target smartphones directly.\u003C\u002Fli\u003E\u003Cli\u003EUse free scam detection tools like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\" rel=\"noreferrer\"\u003EBitdefender Scamio\u003C\u002Fa\u003E and \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\" rel=\"noreferrer\"\u003ELink Checker\u003C\u002Fa\u003E. If you receive a suspicious text message, banking email, social media message, or phishing link, tools like\u003Cstrong\u003E Scamio\u003C\u002Fstrong\u003E can help analyze the content before you interact with it.\u003C\u002Fli\u003E\u003Cli\u003EIf an unknown number keeps calling, Bitdefender’s free \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Freverse-phone-lookup\" rel=\"noreferrer\"\u003E\u003Cstrong\u003EReverse Phone Lookup\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E tool can help determine whether a number has been associated with spam, scams, or suspicious activity. \u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EFor Android users, \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fro-ro\u002Fconsumer\u002Fmobile-security-android\" rel=\"noreferrer\"\u003EBitdefender Mobile Security\u003C\u002Fa\u003E includes a Call Protection feature that helps detect and block scam and spam calls before criminals can manipulate victims into transferring money or revealing sensitive information. The feature uses Bitdefender threat intelligence and community-driven detection systems to flag suspicious calls, including known scam operations and spoofing attempts.\u003C\u002Fp\u003E\u003Cp\u003EYou can read more about Bitdefender’s Call Protection feature \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fblock-the-scam-bitdefenders-new-call-protection-feature-for-android-puts-you-in-control\" rel=\"noreferrer\"\u003Ehere\u003C\u002Fa\u003E.\u003C\u002Fp\u003E",authors:[{id:n,name:o,slug:p,profile_image:q,cover_image:a,bio:r,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:B,name:C,slug:D,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:"A recent ABC7 Chicago investigation reveals how sophisticated banking spoofing scams are draining victims’ accounts, with criminals impersonating banks, Zelle representatives, and even federal agents. The scam is so convincing that it nearly fooled ABC7 anchor Rob Elgas, highlighting just how far such operations have evolved.\n\nAnd this isn’t happening in isolation. The FBI has recently warned that spoofing and impersonation scams are on the rise, with criminals increasingly posing as banks and g",reading_time:H,url:"\u002Fblog\u002Fhotforsecurity\u002Ffbi-warning-bank-spoofing-calls-drain-accounts\u002F"},{id:aE,title:aF,slug:aG,feature_image:aH,featured:c,published_at:aI,custom_excerpt:Q,html:aJ,authors:[{id:u,name:v,slug:w,profile_image:x,cover_image:y,bio:z,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:Q,reading_time:k,url:aK},{id:aL,title:aM,slug:aN,feature_image:aO,featured:c,published_at:aP,custom_excerpt:a,html:aQ,authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:aR,name:aS,slug:aT,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:aU,reading_time:k,url:aV},{id:aW,title:aX,slug:aY,feature_image:aZ,featured:c,published_at:a_,custom_excerpt:a,html:a$,authors:[{id:ba,name:bb,slug:bc,profile_image:bd,cover_image:a,bio:be,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:bf,reading_time:k,url:bg},{id:"69fdd86a2fa53a9f2eef6fad",title:"Mother’s Day scams: How to spot them and shop safely",slug:"mothers-day-scams-2026",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FInstructure-confirms-breach--millions-of-Canvas-users-potentially-impacted--1-.png",featured:c,published_at:"2026-05-08T15:40:52.000+03:00",custom_excerpt:a,html:"\u003Cp\u003EEvery year, scammers take advantage of Mother’s Day by pushing fake deals, messages, gift card scams, and urgent payment requests. They know people are shopping quickly and not always double-checking.\u003Cbr\u003EHere are the most common Mother Days scams and how to avoid them.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EMother’s Day scams often involve fake shops, phishing messages, and gift card requests\u003C\u002Fli\u003E\u003Cli\u003EScammers rely on urgency, emotion, and “too good to be true” deals\u003C\u002Fli\u003E\u003Cli\u003EPayment requests via gift cards, wire transfers, or crypto are a major warning sign\u003C\u002Fli\u003E\u003Cli\u003EFake delivery messages and “Hi Mom” texts are increasingly common\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"what-are-mother%E2%80%99s-day-scams\"\u003EWhat are Mother’s Day scams?\u003C\u002Fh2\u003E\u003Cp\u003EMother’s Day scams are seasonal fraud attempts that take advantage of how people shop and communicate during this time. They are designed to blend into everyday actions like ordering a gift, opening a message, or responding to what looks like a small problem.\u003C\u002Fp\u003E\u003Cp\u003EYou might see them as special offers on flowers or jewelry, delivery notifications, digital greeting cards, or even messages that appear to come from someone you know.\u003C\u002Fp\u003E\u003Ch2 id=\"the-most-common-mother%E2%80%99s-day-scams-to-watch-for\"\u003EThe most common Mother’s Day scams to watch for\u003C\u002Fh2\u003E\u003Cp\u003EMost scams follow the same patterns. Once you know them, they become easier to spot.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFake online shops and flower websites\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EOne of the most frequent traps involves fake shops, especially flower delivery sites or stores selling popular gifts. They often look polished and convincing, with professional photos and attractive prices. You place an order, receive a confirmation, and then… nothing arrives. By the time you realize something is wrong, the site may already be gone.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EGift card scams\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThese usually come through calls, texts, or emails. The story changes, but the pressure stays the same. You might be told there’s a delivery issue, a fine to pay, or an urgent situation involving someone you care about. The solution sounds simple: buy a gift card and share the code.&nbsp; Last year, the&nbsp;Federal Trade Commission \u003Ca href=\"https:\u002F\u002Fconsumer.ftc.gov\u002Fconsumer-alerts\u002F2025\u002F05\u002Favoid-gift-card-scams-mothers-day\"\u003Ewarned \u003C\u002Fa\u003Eabout a surge in these scams. No legitimate company or government agency will ever ask you to pay with a gift card.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EPhishing messages and fake e-cards\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAround holidays, phishing messages often appear as e-cards, order confirmations, or special offers. They invite you to click a link, sometimes out of curiosity, sometimes out of habit. Once you do, you may land on a fake login page or a site designed to collect your details. In some cases, malware can be installed in the background.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E“Hi Mom text” scams\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThis scam starts with a message from an unknown number, claiming to be your child using a new phone. The conversation quickly turns into an urgent request for help, usually involving money. Because it feels personal, many people respond without questioning it.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EFake delivery notifications\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EYou (or your mother) receive a message about a package, often tied to a gift, with a link to track or resolve an issue. Even if you didn’t order anything, curiosity can take over. Clicking the link may lead to phishing pages or requests for personal information.\u003C\u002Fp\u003E\u003Cp\u003ERelated: \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fwhat-to-do-if-your-child-gets-scammed\"\u003EWhat to do if your child gets scammed online: A parent’s step-by-step guide\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"red-flags-to-watch-for\"\u003ERed flags to watch for\u003C\u002Fh2\u003E\u003Cp\u003EIf a deal looks much better than anything else you’ve seen, it’s worth questioning. If a message pushes you to act quickly, without giving you time to think, that’s another warning sign. Payment requests that involve gift cards, wire transfers, or cryptocurrency should always raise concern, especially when they come with urgency or secrecy.\u003C\u002Fp\u003E\u003Cp\u003E Unsolicited messages, unexpected delivery alerts, or emails with unusual links\u003Cstrong\u003E \u003C\u002Fstrong\u003Eare also common indicators that something isn’t right. Most of the time, the feeling that “something is slightly off” is already a good reason to stop and check.\u003C\u002Fp\u003E\u003Cp\u003ERelated: \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Foutsmart-ai-voice-scammers\"\u003EHow to Outsmart AI Voice Scammers Pretending to Be Your Family\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-protect-yourself-and-your-mom-this-mother%E2%80%99s-day\"\u003EHow to protect yourself (and your mom) this Mother’s Day\u003C\u002Fh2\u003E\u003Cp\u003EAvoiding these scams comes down to slowing things down just enough to verify what you’re seeing.\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ELook closely at the URL and search for independent reviews. If a shop only appears through ads or has no real presence outside its own page, it’s safer to avoid it.\u003C\u002Fli\u003E\u003Cli\u003EStick to methods that offer some level of protection, such as credit cards or trusted platforms. These give you options if something goes wrong, unlike gift cards or direct transfers.\u003C\u002Fli\u003E\u003Cli\u003EIf you receive a message about a delivery or an order, avoid clicking the link directly. Instead, go to the official website of the company and check the status there. It takes a few extra seconds, but it removes most of the risk.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EJust as important, take a moment to talk to your mom—especially if she’s not used to these types of scams.\u003C\u002Fp\u003E\u003Cp\u003ELet her know that:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESurprise deliveries can sometimes be fake, even if they look real\u003C\u002Fli\u003E\u003Cli\u003E Messages from “you” on a new number should always be double-checked\u003C\u002Fli\u003E\u003Cli\u003ENo real company or authority will ask for payment through gift cards\u003C\u002Fli\u003E\u003Cli\u003EIt’s always okay to pause and call you before clicking or paying\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EA simple heads-up like, “If you get anything unusual this week, just check with me first,” can make a real difference. Around Mother’s Day, many scams work because they feel like a surprise from a child.\u003C\u002Fp\u003E\u003Cp\u003EIf something doesn’t feel right, you can check links with&nbsp;\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Flink-checker\"\u003EBitdefender Link Checker\u003C\u002Fa\u003E&nbsp;or get a second opinion from&nbsp;\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003EBitdefender Scamio\u003C\u002Fa\u003E&nbsp;—both are free.\u003C\u002Fp\u003E\u003Cp\u003EFor ongoing protection,&nbsp;a Bitdefender Family Plan\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-dk\u002Fconsumer\u002Ffamily\"\u003E keeps your entire family safe\u003C\u002Fa\u003E online.\u003C\u002Fp\u003E\u003Ch2 id=\"faqs\"\u003EFAQs\u003C\u002Fh2\u003E\u003Ch3 id=\"what-should-i-do-if-someone-asks-me-to-pay-with-a-gift-card\"\u003EWhat should I do if someone asks me to pay with a gift card?\u003C\u002Fh3\u003E\u003Cp\u003EIt’s almost always a scam. Stop communication and don’t share any codes.\u003C\u002Fp\u003E\u003Ch3 id=\"is-it-safe-to-buy-gifts-online\"\u003EIs it safe to buy gifts online?\u003C\u002Fh3\u003E\u003Cp\u003EYes, as long as you use trusted retailers and take a moment to verify unfamiliar websites.\u003C\u002Fp\u003E\u003Ch3 id=\"what-should-i-do-if-i-clicked-a-suspicious-link\"\u003EWhat should I do if I clicked a suspicious link?\u003C\u002Fh3\u003E\u003Cp\u003EClose the page immediately, avoid entering any information, and run a security check on your device.\u003C\u002Fp\u003E\u003Ch3 id=\"can-scammers-really-impersonate-family-members\"\u003ECan scammers really impersonate family members?\u003C\u002Fh3\u003E\u003Cp\u003EYes. “Hi Mom” scams rely on emotional trust and are becoming increasingly common.\u003C\u002Fp\u003E\u003Ch3 id=\"are-gift-cards-safe-to-use\"\u003EAre gift cards safe to use?\u003C\u002Fh3\u003E\u003Cp\u003EThey are safe when used as gifts, but not as a form of payment. Any request to pay with a gift card is a strong sign of a scam.\u003C\u002Fp\u003E",authors:[{id:"66d5cbea28045a04f10b89cc",name:"Cristina POPOV",slug:"cpopov",profile_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2025\u002F12\u002F20251024_153349.jpg",cover_image:a,bio:"Cristina Popov is a Denmark-based content creator and small business owner who has been writing for Bitdefender since 2017, making cybersecurity feel more human and less overwhelming. ",website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:B,name:C,slug:D,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:"Every year, scammers take advantage of Mother’s Day by pushing fake deals, messages, gift card scams, and urgent payment requests. They know people are shopping quickly and not always double-checking.\nHere are the most common Mother Days scams and how to avoid them.\n\n\nKey takeaways\n\n * Mother’s Day scams often involve fake shops, phishing messages, and gift card requests\n * Scammers rely on urgency, emotion, and “too good to be true” deals\n * Payment requests via gift cards, wire transfers, or c",reading_time:H,url:"\u002Fblog\u002Fhotforsecurity\u002Fmothers-day-scams-2026\u002F"},{id:"69fdbbc12fa53a9f2eef6f52",title:"Ubuntu’s new AI dreams attracted a very old-fashioned crypto scam on X",slug:"ubuntus-crypto-scam-x-twitter-solana",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FChatGPT-Image-May-8--2026--01_32_01-PM.png",featured:c,published_at:"2026-05-08T13:37:19.000+03:00",custom_excerpt:bK,html:"\u003Cp\u003E\u003Cem\u003EThe official Ubuntu account on X (formerly Twitter) was briefly compromised by unknown attackers who used it to promote a fake AI agent and send people to a well-built website where they could share their crypto wallet.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EA few days before this incident, Canonical wanted to \u003Ca href=\"https:\u002F\u002Fdiscourse.ubuntu.com\u002Ft\u002Fthe-future-of-ai-in-ubuntu\u002F81130\"\u003Eposition\u003C\u002Fa\u003E Ubuntu as a privacy-friendly, local-first AI platform. Attackers weaponized that exact narrative within days.\u003C\u002Fp\u003E\u003Cp\u003EA suspected compromise of Ubuntu’s official X account pushed a fake “Ubuntu AI agent” called ‘\u003Cem\u003ENumbat,’\u003C\u002Fem\u003E directing users to a malicious crypto phishing website designed to steal wallet access.\u003C\u002Fp\u003E\u003Cp\u003EThe attack came shortly after Canonical revealed plans to expand AI integration inside Ubuntu, and after the company was recovering from a prolonged DDoS campaign targeting its infrastructure.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\n\u003Cli\u003EAttackers exploited recent Ubuntu AI announcements to launch a fake crypto campaign\u003C\u002Fli\u003E\n\u003Cli\u003EA suspected compromise of Ubuntu’s X account helped spread the scam\u003C\u002Fli\u003E\n\u003Cli\u003EThe phishing operation used a fake “Numbat” AI agent tied to Solana\u003C\u002Fli\u003E\n\u003Cli\u003EThe malicious site copied real Ubuntu AI content and branding\u003C\u002Fli\u003E\n\u003Cli\u003EUsers were ultimately pushed toward connecting crypto wallets\u003C\u002Fli\u003E\n\u003Cli\u003EThe campaign arrived shortly after Canonical suffered prolonged DDoS attacks\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"what-really-happened\"\u003EWhat really happened\u003C\u002Fh2\u003E\u003Cp\u003EOn May 7, users noticed a suspicious thread posted from what appeared to be Ubuntu’s official X account. The posts announced “Numbat,” described as “Ubuntu’s newest AI agent built on Solana.”\u003C\u002Fp\u003E\u003Cp\u003EAt first glance, the announcement seemed plausible. Canonical had already been discussing Ubuntu’s AI direction publicly, and the branding referenced Ubuntu’s “Noble Numbat” naming convention.\u003C\u002Fp\u003E\u003Cp\u003EInstead of using crude phishing tactics, they built a layered narrative that felt consistent with existing Ubuntu discussions. The X post used professional visuals, authentic branding, and language that closely aligned with Canonical’s previous messaging.\u003C\u002Fp\u003E\u003Cp\u003EThe phishing site operated under the domain “ai-ubuntu[.]com,” which looked enough like an official Canonical subdomain to likely fool distracted users. The attackers also disabled replies on the X thread, making it harder for users to publicly warn others about the scam.\u003C\u002Fp\u003E\u003Ch2 id=\"the-crypto-wallet-trap-hidden-behind-the-ai-branding\"\u003EThe crypto wallet trap hidden behind the AI branding\u003C\u002Fh2\u003E\u003Cp\u003EThe campaign's real objective emerged only after users interacted with the site. Visitors encountered language suggesting that early participants might qualify for future “$UM” token allocations, accompanied by urgent phrases such as “Snapshot approaching.”\u003C\u002Fp\u003E\u003Cp\u003EThe wording followed a familiar crypto scam formula: create a sense of urgency, imply exclusivity and reward early adopters. When users clicked buttons like “Check eligibility” or “Explore Ubuntu AI,” the site prompted them to connect cryptocurrency wallets.\u003C\u002Fp\u003E\u003Cp\u003EAttackers likely intended to harvest wallet permissions, steal assets or collect sensitive account information through the approval process.\u003C\u002Fp\u003E\u003Ch2 id=\"were-the-ddos-attacks-connected\"\u003EWere the DDoS attacks connected?\u003C\u002Fh2\u003E\u003Cp\u003EThe phishing campaign was launched shortly after Canonical faced a DDoS attack that disrupted Ubuntu infrastructure for nearly five days.\u003C\u002Fp\u003E\u003Cp\u003EServices including ubuntu.com, Launchpad, and Snap-related systems suffered outages or instability during the incident. According to an It’s Foss \u003Ca href=\"https:\u002F\u002Fitsfoss.com\u002Fnews\u002Fubuntu-is-getting-ai\u002F\"\u003Ereport\u003C\u002Fa\u003E, a group identifying itself as “313 Team” reportedly claimed responsibility for the attacks, although Canonical did not officially confirm attribution.\u003C\u002Fp\u003E\u003Cp\u003ECanonical had not yet released a detailed public post-incident analysis explaining exactly what happened with the X account, and the post made by the attackers was quickly deleted. The good news is that the DDoS attack has stopped, and all services are up and running.\u003C\u002Fp\u003E\n\u003C!--kg-card-begin: html--\u003E\n\u003Cdiv style=\"background:#F9F9F9;border:1px solid #e5e5e5;border-radius:12px;padding:24px;\"\u003E\n\n\u003Ch2\u003EFAQ\u003C\u002Fh2\u003E\n\n\u003Chr\u003E\n\n\u003Ch3\u003EWas Ubuntu launching a crypto AI agent?\u003C\u002Fh3\u003E\n\n\u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E No. The “Numbat” AI project was part of a phishing campaign impersonating Ubuntu and Canonical.\u003C\u002Fp\u003E\n\n\u003Chr\u003E\n\n\u003Ch3\u003EWas Ubuntu’s X account hacked?\u003C\u002Fh3\u003E\n\n\u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E Canonical has not publicly confirmed the exact cause at the time of reporting, but the account appeared to be compromised or abused to spread the scam for a very short time.\u003C\u002Fp\u003E\n\n\u003Chr\u003E\n\n\u003Ch3\u003EWhat was ai-ubuntu[.]com?\u003C\u002Fh3\u003E\n\n\u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E A fake website designed to mimic Ubuntu AI pages and trick users into connecting crypto wallets.\u003C\u002Fp\u003E\n\n\u003Chr\u003E\n\n\u003Ch3\u003EWas Ubuntu itself compromised?\u003C\u002Fh3\u003E\n\n\u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E No evidence suggested Ubuntu systems or repositories were breached. The incident centered on phishing and web-related attacks.\u003C\u002Fp\u003E\n\n\u003Chr\u003E\n\n\u003Ch3\u003EHow can users stay safe?\u003C\u002Fh3\u003E\n\n\u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E Verify domains carefully, avoid connecting wallets to unknown sites and treat AI-themed crypto promotions with skepticism.\u003C\u002Fp\u003E\n\n\u003C\u002Fdiv\u003E\n\u003C!--kg-card-end: html--\u003E\n",authors:[{id:u,name:v,slug:w,profile_image:x,cover_image:y,bio:z,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],excerpt:bK,reading_time:k,url:"\u002Fblog\u002Fhotforsecurity\u002Fubuntus-crypto-scam-x-twitter-solana\u002F"}],sidePosts:[{id:aa,title:ab,slug:ac,feature_image:ad,featured:c,published_at:ae,custom_excerpt:a,html:"\u003Cp\u003E\u003Cem\u003EWhatsApp is rolling out a major new feature designed to make the world’s most popular messaging service safer for kids: \u003Cstrong\u003Eparent-managed accounts\u003C\u002Fstrong\u003E.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways:\u003C\u002Fh2\u003E\n\u003Cul\u003E\n\u003Cli\u003E\n\u003Cp\u003EWhatsApp is formally expanding into the pre-teen space with built-in parental oversight\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003Cli\u003E\n\u003Cp\u003EParent-managed accounts are designed with expert and family input\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003Cli\u003E\n\u003Cp\u003EParents retain control over privacy and contact permissions, while core protections like end-to-end encryption remain intact\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003Cli\u003E\n\u003Cp\u003EAdvanced features such as Channels, AI tools, and Status may be restricted, limiting exposure to broader social features\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003Cli\u003E\n\u003Cp\u003EThe rollout is gradual and global, suggesting WhatsApp is testing and refining the feature based on feedback\u003C\u002Fp\u003E\n\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"introducing-parent-managed-accounts-on-whatsapp\"\u003EIntroducing parent-managed accounts on WhatsApp\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E“With input from families and experts, we're rolling out new parent-managed accounts that allow parents or guardians to set up WhatsApp for pre-teens, with new controls to limit their WhatsApp experience to messaging and calling,” the Meta-owned company announced this week.\u003C\u002Fp\u003E\u003Cp\u003EParents can now create and oversee a child’s WhatsApp account and control who can message or call their child, which groups they can join, and how privacy settings are configured.\u003C\u002Fp\u003E\u003Cp\u003EDesigned specifically for pre-teens, parent-managed accounts limit a child’s experience to core messaging and calling features while preventing access to advanced features like AI tools, Channels, and Status updates in some configurations.\u003C\u002Fp\u003E\u003Cp\u003EWhatsApp’s move reflects \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Freddit-fined-20-million-children-privacy\"\u003E\u003Cstrong\u003Egrowing industry pressure to improve child safety online\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EHere are the \u003Cstrong\u003Estep-by-step setup guides\u003C\u002Fstrong\u003E for both \u003Cstrong\u003EiPhone\u003C\u002Fstrong\u003E and \u003Cstrong\u003EAndroid\u003C\u002Fstrong\u003E devices on how to enable the feature.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fparent-managed-whatsapp.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"781\" height=\"439\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F03\u002Fparent-managed-whatsapp.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fparent-managed-whatsapp.jpg 781w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003E\u003Cstrong\u003EBefore you begin, make sure you and your child have:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EBoth\u003C\u002Fstrong\u003E devices (parent and child) nearby\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EActive\u003C\u002Fstrong\u003E WhatsApp installed\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EA phone number\u003C\u002Fstrong\u003E dedicated to the child’s account\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"on-iphone-ios\"\u003EOn iPhone (iOS)\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E1.&nbsp;&nbsp;&nbsp;&nbsp; \u003Cstrong\u003EOpen WhatsApp on the parent’s phone\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E2.&nbsp;&nbsp;&nbsp;&nbsp; Go to \u003Cstrong\u003ESettings → Account → Parent-Managed Accounts\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E3.&nbsp;&nbsp;&nbsp;&nbsp; Choose \u003Cstrong\u003ESet up a managed account\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E4.&nbsp;&nbsp;&nbsp;&nbsp; You’ll be prompted to \u003Cstrong\u003Eenter your child’s phone number\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E5.&nbsp;&nbsp;&nbsp;&nbsp; WhatsApp will send a \u003Cstrong\u003Everification code\u003C\u002Fstrong\u003E to that number — enter it to verify\u003C\u002Fp\u003E\u003Cp\u003E6.&nbsp;&nbsp;&nbsp;&nbsp; Follow the on-screen prompts to \u003Cstrong\u003Elink your child’s device\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E7.&nbsp;&nbsp;&nbsp;&nbsp; Once the link is established, you’ll be asked to create a \u003Cstrong\u003Eparent PIN\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E8.&nbsp;&nbsp;&nbsp;&nbsp; Confirm who can contact your child and set privacy choices\u003C\u002Fp\u003E\u003Ch2 id=\"on-android\"\u003EOn Android\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E1.&nbsp;&nbsp;&nbsp;&nbsp; Launch WhatsApp on your device\u003C\u002Fp\u003E\u003Cp\u003E2.&nbsp;&nbsp;&nbsp;&nbsp; Navigate to \u003Cstrong\u003ESettings → Account → Parent-Managed Accounts\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E3.&nbsp;&nbsp;&nbsp;&nbsp; Tap \u003Cstrong\u003ECreate a managed account for a child\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E4.&nbsp;&nbsp;&nbsp;&nbsp; Enter your child’s phone number and complete the \u003Cstrong\u003Everification step\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003E5.&nbsp;&nbsp;&nbsp;&nbsp; Follow the prompts to \u003Cstrong\u003Epair with your child’s phone\u003C\u002Fstrong\u003E using the QR code or PIN flow\u003C\u002Fp\u003E\u003Cp\u003E6.&nbsp;&nbsp;&nbsp;&nbsp; Set up a \u003Cstrong\u003Eparent PIN\u003C\u002Fstrong\u003E for managing settings\u003C\u002Fp\u003E\u003Cp\u003E7.&nbsp;&nbsp;&nbsp;&nbsp; Customize contact permissions, group controls, and privacy filters\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003E(\u003Cstrong\u003ENote:\u003C\u002Fstrong\u003E These steps are based on published help content from \u003C\u002Fem\u003E\u003Ca href=\"https:\u002F\u002Ffaq.whatsapp.com\u002F875902238256170\u002F\"\u003E\u003Cem\u003EWhatsApp\u003C\u002Fem\u003E\u003C\u002Fa\u003E\u003Cem\u003E — exact labels may vary depending on app version or region.)\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"tips-for-parents-after-setup\"\u003ETips for parents after setup\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EOnce your child’s account is linked, consider these best practices:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EReview privacy settings periodically\u003C\u002Fstrong\u003E to ensure they still match your family’s comfort level\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ELimit group chats\u003C\u002Fstrong\u003E to only trusted contacts\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ETeach your child about online safety\u003C\u002Fstrong\u003E — including how to recognize suspicious contacts and not to share personal information\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EWhatsApp added during the Wednesday \u003Ca href=\"https:\u002F\u002Fblog.whatsapp.com\u002Fintroducing-parent-managed-accounts-on-whatsapp\"\u003Eannouncement\u003C\u002Fa\u003E that it looks forward to feedback as it gradually rolls out the parent management feature over the coming months, \"so we can continue building WhatsApp to provide the safest and most private way for families to connect.\"\u003C\u002Fp\u003E\u003Cp\u003EA video guide on “\u003Cstrong\u003EParent-managed accounts on WhatsApp”\u003C\u002Fstrong\u003E is also available:\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-embed-card\"\u003E\u003Ciframe width=\"200\" height=\"113\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FTan9jBmKIjI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\" title=\"How to set up &amp; monitor parental controls for parent-managed accounts | WhatsApp\"\u003E\u003C\u002Fiframe\u003E\u003C\u002Ffigure\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"frequently-asked-questions-faq\"\u003EFrequently asked questions (FAQ)\u003C\u002Fh2\u003E\u003Ch3 id=\"can-you-set-up-parental-controls-on-whatsapp\"\u003ECan you set up parental controls on WhatsApp?\u003C\u002Fh3\u003E\u003Cp\u003EWhatsApp does not offer built-in parental controls, but you can increase safety using privacy settings and device-level controls. Parents can restrict who can contact the child, disable profile visibility, and use third-party parental control apps to monitor usage and limit screen time.\u003C\u002Fp\u003E\u003Ch3 id=\"how-to-set-up-bitdefender-parental-control\"\u003EHow to set up Bitdefender parental control?\u003C\u002Fh3\u003E\u003Cp\u003ETo set up Bitdefender Parental Control, install the Bitdefender app on the parent’s device and create a child profile. Then install the Parental Control app on the child’s device, log in with the same account, and link the device. From the dashboard, you can manage screen time, app usage, location tracking, and web filtering.\u003C\u002Fp\u003E\u003Ch3 id=\"how-to-make-your-account-parent-managed\"\u003EHow to make your account parent-managed?\u003C\u002Fh3\u003E\u003Cp\u003ETo make an account parent-managed, you typically need to create or link it through a parental control system such as Google Family Link or Apple Family Sharing. This allows a parent to supervise activity, set restrictions, approve downloads, and manage screen time from their own device.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also want to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fkids-bypass-age-verification\"\u003E\u003Cstrong\u003E\u003Cem\u003EHow Kids Bypass Age Verification Online and what Families Can Do About It\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fyoutube-gives-parents-more-control-over-teens-shorts-and-screen-time\"\u003E\u003Cstrong\u003E\u003Cem\u003EYouTube Gives Parents More Control Over Teens’ Shorts and Screen Time\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fchatgpt-now-has-parental-controls-what-parents-can-now-do-and-what-they-cant\"\u003E\u003Cstrong\u003E\u003Cem\u003EChatGPT Now Has Parental Controls: What Parents Can Now Do and What They Can’t\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E",tags:[{id:h,name:i,slug:j,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:af,name:ag,slug:ah,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:ai,reading_time:k,url:aj},{id:ak,title:al,slug:am,feature_image:an,featured:m,published_at:ao,custom_excerpt:O,html:"\u003Cp\u003E\u003Cem\u003EFree F1 streaming sites may seem like an easy way to watch races—but they often come with hidden risks. Behind the promise of “free access” lies a complex ecosystem of tracking, malware, and aggressive monetization. Understanding these risks is essential before clicking on unofficial streams.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey Takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EFree streaming sites are rarely truly “free.”\u003C\u002Fstrong\u003E Many operate as traffic monetization networks, using redirects, hidden ads, and scripts to generate revenue from every click.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EMalware and data tracking are major risks.\u003C\u002Fstrong\u003E Users can be exposed to malicious downloads, hidden trackers, and data harvesting mechanisms that collect browsing behavior.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ESites often use deceptive infrastructure to avoid detection.\u003C\u002Fstrong\u003E Domains rotate frequently, and hidden elements like pop-unders and iframes run in the background without user awareness.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EChildren face additional exposure to harmful content.\u003C\u002Fstrong\u003E Unregulated streaming sites may display gambling ads, explicit material, and unsafe chat environments.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"why-free-f1-streaming-sites-are-risky-and-what-to-watch-out-for\"\u003EWhy Free F1 Streaming Sites Are Risky and What to Watch Out For\u003C\u002Fh2\u003E\u003Cp\u003ESpring signals the return of major global sporting events, including Formula One and the start of baseball season, with this year drawing even greater worldwide attention due to the FIFA World Cup 2026.\u003C\u002Fp\u003E\u003Cp\u003EGlobal audiences are once again searching for ways to follow live action across time zones and devices. At the same time, the steady rise in subscription costs, the continued decline of traditional cable bundles, and the reality of watching while traveling have driven more viewers toward “free” streaming alternatives.\u003C\u002Fp\u003E\u003Cp\u003EEasy-to-find websites that promise free streaming can seem like a great deal, especially when subscription costs continue to rise. But they are rarely free in any real sense. The people behind these services do not need sophisticated scams to attract users. They simply rely on demand, curiosity, and the appeal of saving money. Once someone visits the site, the real business model begins. Every click, redirect, and interaction becomes an opportunity to generate revenue, often in ways users never see.\u003C\u002Fp\u003E\u003Cp\u003EWhat begins as a visit can quickly turn users into victims, exposing them to malware infections and data harvesting. When children are involved, the risks escalate even further, with exposure to gambling promotions and adult content adding another layer of harm.\u003C\u002Fp\u003E\u003Cp\u003ETo better understand the risks, Bitdefender researchers analyzed a range of free streaming sites and uncovered consistent patterns of aggressive monetization, hidden tracking mechanisms, and malicious infrastructure operating behind the scenes.\u003C\u002Fp\u003E\u003Ch2 id=\"how-free-streaming-is-gaining-visibility\"\u003EHow free streaming is gaining visibility\u003C\u002Fh2\u003E\u003Cp\u003EIt’s not surprising that millions of people worldwide turn to their favorite search engine or AI assistant each day, using queries like “watch free live sports,” “free F1 stream,” or “no subscription football.”\u003C\u002Fp\u003E\u003Cp\u003EWith the right search terms, these websites will appear on the first page of Google. And even LLMs recommend them when queries are framed in certain ways.\u003C\u002Fp\u003E\u003Cp\u003EHere’s a snippet from a discussion with ChatGPT:\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fimage-3.png\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"809\" height=\"545\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F03\u002Fimage-3.png 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fimage-3.png 809w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003ELive sports and other events naturally create a sense of urgency. When a major game, race, or pay-per-view broadcast is about to begin, fans want immediate access. In that moment, some turn to alternative platforms, believing they’ve found a convenient and cost-effective solution.\u003C\u002Fp\u003E\u003Cp\u003EWebsites, IPTV apps, M3U playlists, Telegram channels, addons for video players, and “fully loaded” Android TV boxes promise access to streaming without monthly fees. \u003C\u002Fp\u003E\u003Cp\u003EWhile the offer feels simple, the infrastructure behind it is anything but. When a platform does not charge users directly, it monetizes them indirectly.\u003C\u002Fp\u003E\u003Ch2 id=\"what-our-technical-review-revealed\"\u003EWhat our technical review revealed\u003C\u002Fh2\u003E\u003Cp\u003EWhen we took a closer look, we immediately saw clear patterns that these are very well-organized operations.\u003C\u002Fp\u003E\u003Cp\u003EMany of these free platforms rely on redirect chains. The user accesses a domain via a Google search, only to be redirected to a secondary site that later rotates to newly registered addresses. This domain pivoting will help the website operators bypass ISP blocks and quickly return after takedowns.\u003C\u002Fp\u003E\u003Ch3 id=\"here-are-a-few-examples\"\u003EHere are a few examples:\u003C\u002Fh3\u003E\u003Ch3 id=\"\"\u003E\u003C\u002Fh3\u003E\u003Cul\u003E\n\u003Cli\u003Elivesport24[.]watch → redirects to livetv[.]sx → which rotates to livetv873[.]me\u003C\u002Fli\u003E\n\u003Cli\u003Eviptrans[.]info → redirects to sharkstreams[.]net\u003C\u002Fli\u003E\n\u003Cli\u003Estreamshub[.]site → redirects to streameast[.]gl\u003C\u002Fli\u003E\n\u003Cli\u003Estreamarena[.]fit → redirects to crackstreams[.]gl\u003C\u002Fli\u003E\n\u003Cli\u003Estreamspass[.]fit → redirects to methstreams[.]gl\u003C\u002Fli\u003E\n\u003Cli\u003Extremeast[.]com → associated with variations of the streameast brand (including domain pivots such as streameasts[.]com and previously streameast[.]fun)\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002FF1_stream.png\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"468\" height=\"294\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EWhat appear to be independent websites often have similar layouts, and one backend can power dozens of streaming storefronts.\u003C\u002Fp\u003E\u003Cp\u003EThe goal of most of these platforms is simple: to get users to open their websites with the promise of free live stream so that they can serve extremely aggressive ads.\u003C\u002Fp\u003E\u003Cp\u003EThe bigger problem, which is more concerning than the ads themselves, is the monetization techniques embedded in the code.\u003C\u002Fp\u003E\u003Cp\u003EAnother dangerous aspect is the use of invisible iframes. Regular iframes are used everywhere, and they are basically windows that embed content from another source into a host page, such as video players or ads.\u003C\u002Fp\u003E\u003Cp\u003EHowever, some pages contained invisible iframes (they function like regular ones, but are not visible to the website visitor) placed off-screen at coordinates such as -1000 pixels, which means that hidden elements load third-party pages in the background without the user knowing.\u003C\u002Fp\u003E\u003Cpre\u003E\u003Ccode class=\"language-bash\"\u003E&lt;iframe width=\"0\" height=\"0\" style=\"position: absolute; top: -1000px; left: -1000px; visibility: hidden; border: medium none; background-color: transparent;\"&gt;&lt;\u002Fiframe&gt;\n&lt;a href=\"https:\u002F\u002Ffrwibqgkiqzpz.site\u002Fad\u002Fvisit.php?al=1\" style=\"display: none; visibility: hidden; position: relative; left: -1000px; top: -1000px;\"&gt;&lt;\u002Fa&gt;\u003C\u002Fcode\u003E\u003C\u002Fpre\u003E\n\u003Cp\u003EThis technique can generate advertising revenue, start various background redirects and even silently connect users to other monetization networks.\u003C\u002Fp\u003E\u003Cp\u003EWe also observed DNS prefetch instructions that prepare connections to obscure external domains before any visible interaction occurs. This accelerates the loading of hidden traffic and improves ad delivery performance behind the scenes.\u003C\u002Fp\u003E\u003Cpre\u003E\u003Ccode class=\"language-bash\"\u003E&lt;link rel=\"dns-prefetch\" href=\"\u002F\u002Fieenhjxbigyt[.]space\"&gt;\n&lt;link rel=\"dns-prefetch\" href=\"\u002F\u002Fadexchangeclear[.]com\"&gt;\n&lt;link rel=\"dns-prefetch\" href=\"\u002F\u002Ffrwlbqgkiqzpz[.]site\"&gt;\n\u003C\u002Fcode\u003E\u003C\u002Fpre\u003E\n\u003Cp\u003EThe reason for those strange domain names is simple. The website operations are trying to stay ahead of ad blockers, as older domain names get blacklisted.\u003C\u002Fp\u003E\u003Ch2 id=\"tracking-and-profiling\"\u003ETracking and profiling\u003C\u002Fh2\u003E\u003Cp\u003ESeveral analyzed pages embedded Google Analytics and Meta (Facebook) Pixel tracking scripts, and one of the websites even used tracking from Yandex, which is a Russian search engine.\u003C\u002Fp\u003E\u003Cp\u003EPixel tracking means the website sends browsing event data to Meta’s servers. or whichever service is used. That data can include the URL of the visited page, timestamp, IP address, browser configuration and other unique cookie identifiers.\u003C\u002Fp\u003E\u003Cp\u003EThis means that if a user is logged into Facebook or has Facebook cookies stored in the browser, Meta can associate that visit with an advertising profile. That profile will be used to server similar ads when visiting other websites.\u003C\u002Fp\u003E\u003Cp\u003EThe user's data trail doesn't disappear when the “free streaming website” is closed. There’s no such thing as a free lunch.\u003C\u002Fp\u003E\u003Ch2 id=\"the-malware-and-ad-fraud-layer\"\u003EThe malware and ad-fraud layer\u003C\u002Fh2\u003E\u003Cp\u003EOther free streaming websites also integrate aggressive pop-under scripts and high-risk advertising networks. There’s no guarantee that a simple and annoying ad loaded today can’t be replaced with a much more dangerous one tomorrow.\u003C\u002Fp\u003E\u003Cp\u003EFurthermore, these scripts can trigger automatic redirects to online casinos, sports betting platforms, adult content portals, fake antivirus alerts or cryptocurrency investment scams. The variations are endless and are usually served depending on the location of the user.\u003C\u002Fp\u003E\u003Cp\u003EBecause these platforms operate outside regulated advertising frameworks, they might not filter inappropriate categories. In this model, the live stream serves as bait. The real revenue flows from traffic manipulation and advertising.\u003C\u002Fp\u003E\u003Ch2 id=\"it%E2%80%99s-a-well-known-pattern\"\u003EIt’s a well-known pattern\u003C\u002Fh2\u003E\u003Cp\u003EThese problems are not isolated observations. A 2026 study published in the \u003Ca href=\"https:\u002F\u002Fwww.mdpi.com\u002F2624-800X\u002F6\u002F1\u002F8\" rel=\"noreferrer\"\u003EJournal of Cybersecurity and Privacy\u003C\u002Fa\u003E analyzed 260 free live sports streaming sites and found that nearly one in three sites (31.5%) contained malicious JavaScript capable of injecting ads, redirecting users or loading harmful content.\u003C\u002Fp\u003E\u003Cp\u003ETheir analysis also revealed malware that could install itself, create persistence, and communicate with external command-and-control servers.\u003C\u002Fp\u003E\u003Cp\u003EInvestigators also identified eight clusters of co-owned domains, including one cluster of 12 different sports streaming sites targeting North American audiences that all shared the same Google AdSense ID. What appear to be separate websites often belong to the same centralized operation.\u003C\u002Fp\u003E\u003Cp\u003EDuring the study, the number of confirmed phishing redirect URLs increased from 37 to 51, which showed that malicious pages remained active before being flagged by public blacklists.\u003C\u002Fp\u003E\u003Cp\u003EAlso, in the European Union, \u003Ca href=\"https:\u002F\u002Fwww.euipo.europa.eu\u002Fen\u002Fnews\u002Fonline-piracy-study-europeans-are-consuming-more-pirated-tv-shows-and-live-sports\" rel=\"noreferrer\"\u003Ea 2023 study\u003C\u002Fa\u003E found that streaming has become the most popular method to access illicit TV content, with 58 % of piracy in the EU occurring via streaming.\u003C\u002Fp\u003E\u003Ch2 id=\"why-children-face-a-higher-level-of-risk\"\u003EWhy children face a higher level of risk\u003C\u002Fh2\u003E\u003Cp\u003EThe danger escalates when minors are involved. A kid searching for “watch cartoons free” or “free football stream” can land on the same piracy infrastructure.\u003Cbr\u003EUnlike licensed streaming platforms, these websites don’t enforce age verification, content segmentation or advertising standards.\u003C\u002Fp\u003E\u003Cp\u003EKids will get to see banner ads for online gambling and explicit websites often appear directly next to the video player. Some pop-ups open adult pages automatically in new tabs.\u003C\u002Fp\u003E\u003Cp\u003ESports streams frequently embed betting promotions that normalize gambling behavior and kids getting repeated exposure to this type of messaging might start to believe that it’s normal.\u003C\u002Fp\u003E\u003Cp\u003ELicensed streaming platforms must comply with child-protection and advertising regulations; these services don’t have the same constraints or even consider the user's age. Because they are so focused on ad revenue, they don’t really care about trivial stuff like age.\u003C\u002Fp\u003E\u003Ch2 id=\"the-hidden-risks-of-%E2%80%9Cfully-loaded%E2%80%9D-android-tv-boxes\"\u003EThe hidden risks of “fully loaded” Android TV boxes\u003C\u002Fh2\u003E\u003Cp\u003EAndroid TV boxes themselves are not inherently unsafe and major and well-known brands ship devices that get security patches, have app-store controls and operate within licensed streaming ecosystems.\u003C\u002Fp\u003E\u003Cp\u003EThe problem starts with devices marketed as “fully loaded,” “jailbroken,” or “pre-configured with free sports.” For the most part, all of these devices use IPTV (Internet Protocol Television), the technology needed to bring users television content, such as live channels and movies) to your screen, over the internet.\u003C\u002Fp\u003E\u003Cp\u003EHere’s how one of these boxes look , with Live TV running:\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Ftv_stream.png\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1430\" height=\"809\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F03\u002Ftv_stream.png 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F03\u002Ftv_stream.png 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Ftv_stream.png 1430w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EThe device itself promises “Ministra\u002FStalker\u002FXtream\u002FM3U protocols accounts supported”, which, at the very least, it’s ready to be configured with third-party streams; depending on the device, the TV Box might come with everything already enabled.\u003C\u002Fp\u003E\u003Cp\u003EMany modified Android TV boxes run outdated Android versions that no longer receive security updates. Some sellers disable automatic updates entirely to prevent unofficial apps from breaking. As a result, known vulnerabilities can remain permanently exposed.\u003C\u002Fp\u003E\u003Cp\u003EUnlike a browser session that ends when a tab closes, a TV box remains continuously connected to the home network. If compromised, it can act as:\u003C\u002Fp\u003E\u003Cul\u003E\n\u003Cli\u003EA network foothold inside the home\u003C\u002Fli\u003E\n\u003Cli\u003EA pivot point to scan other connected devices\u003C\u002Fli\u003E\n\u003Cli\u003EA passive traffic monitor on the local network\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Cp\u003EBecause these devices connect directly to Wi-Fi routers, any weakness affects more than just streaming quality. It greatly increases the attack surface in any home.\u003C\u002Fp\u003E\u003Cp\u003EThere is also a supply-chain concern. Many low-cost Android TV boxes are made by generic manufacturers that only care to bring their product to market quickly, with no regard for security.\u003C\u002Fp\u003E\u003Cp\u003EResearchers have previously identified Android TV boxes preinstalled with malware. The FBI has also \u003Ca href=\"https:\u002F\u002Fwww.ic3.gov\u002FPSA\u002F2025\u002FPSA250605\" rel=\"noreferrer\"\u003Eissued warnings\u003C\u002Fa\u003E about this risk.\u003C\u002Fp\u003E\u003Cp\u003EA device positioned in the living room that’s always on and connected to the network is a much bigger security risk than visiting a website.\u003C\u002Fp\u003E\u003Ch2 id=\"is-iptv-illegal\"\u003EIs IPTV illegal?\u003C\u002Fh2\u003E\u003Cp\u003EThe IPTV technology itself is legal and many legitimate broadcasters use it to offer their licensed content over the internet.\u003C\u002Fp\u003E\u003Cp\u003EHowever, streaming copyrighted content without authorization violates copyright law in many countries. Authorities have only recently \u003Ca href=\"https:\u002F\u002Fwww.eurojust.europa.eu\u002Fnews\u002Fsuccessful-operation-against-illegal-streaming-services-millions-users-worldwide\" rel=\"noreferrer\"\u003Eseized large IPTV networks\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EEven when legal consequences do not reach end users, financial risks remain. Subscriber databases can leak and payment details may be stored insecurely, eventually ending up on the Dark Net.\u003C\u002Fp\u003E\u003Ch2 id=\"there%E2%80%99s-always-the-torrent-problem\"\u003EThere’s always the torrent problem\u003C\u002Fh2\u003E\u003Cp\u003EWhile free streaming content is the preferred method for users, some will try to find recordings of past sporting events on torrent websites. Our researchers found the \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Flabs\u002Flummastealer-second-life-castleloader\" rel=\"noreferrer\"\u003ELummaStealer malware\u003C\u002Fa\u003E hidden in popular torrents.\u003C\u002Fp\u003E\u003Cp\u003ECybercriminals frequently embed malware within popular content that people actively seek, meaning that the higher the profile of a sporting event, the greater the risk associated with related torrent downloads.\u003C\u002Fp\u003E\u003Cp\u003EFor example, fans searching torrent sites for a recording of a recently concluded F1 race are likely to encounter malicious files disguised as legitimate content.\u003C\u002Fp\u003E\u003Cp\u003EThe image below shows Bitdefender detections of files users attempted to download, believing they had found the latest Brad Pitt film F1, when in reality the files contained malware.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002FPicture1.png\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"2000\" height=\"985\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F03\u002FPicture1.png 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F03\u002FPicture1.png 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1600\u002F2026\u002F03\u002FPicture1.png 1600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw2400\u002F2026\u002F03\u002FPicture1.png 2400w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EIn addition to malware risks, some torrent platforms also employ aggressive advertising networks that may display explicit content, creating additional exposure concerns for minors.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Frarbg.png\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1430\" height=\"724\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F03\u002Frarbg.png 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F03\u002Frarbg.png 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Frarbg.png 1430w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EIn some cases, torrent sites actively inject malicious code directly into users’ browsers, a tactic observed in several Pirate Bay clones. Without effective endpoint protection, visitors may be exposed to immediate compromise.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fimage-5.png\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"468\" height=\"235\"\u003E\u003C\u002Ffigure\u003E\u003Ch2 id=\"how-to-stream-safely\"\u003EHow to stream safely\u003Cbr\u003E\u003C\u002Fh2\u003E\u003Cp\u003EYou don’t need to abandon online streaming, but you do need to approach it responsibly.\u003C\u002Fp\u003E\u003Cul\u003E\n\u003Cli\u003EChoose licensed platforms that have the distribution rights. These services usually implement advertising standards and parental controls.\u003C\u002Fli\u003E\n\u003Cli\u003EEnable parental controls on smart TVs, streaming devices and home routers. Activate safe browsing filters where available. Keep devices updated with the latest security patches.\u003C\u002Fli\u003E\n\u003Cli\u003EInstall a reputable security solution that blocks malicious websites, detects infected APK files, prevents phishing redirects and monitors suspicious network activity.\u003C\u002Fli\u003E\n\u003Cli\u003EMost importantly, talk to children and teens about online risks. “Free” online content often comes with invisible trade-offs.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"faq\"\u003EFAQ\u003C\u002Fh2\u003E\u003Ch3 id=\"are-free-streaming-sites-dangerous\"\u003EAre free streaming sites dangerous?\u003C\u002Fh3\u003E\u003Cp\u003EYes. Many rely on aggressive ad networks, hidden tracking scripts, and unregulated infrastructure that can expose users to malware, scams, and explicit content.\u003C\u002Fp\u003E\u003Ch3 id=\"can-iptv-apps-infect-my-device\"\u003ECan IPTV apps infect my device?\u003C\u002Fh3\u003E\u003Cp\u003EUnofficial IPTV apps downloaded from outside trusted app stores may contain trojanized code or request excessive permissions, compromising device security.\u003C\u002Fp\u003E\u003Ch3 id=\"do-pirate-streaming-sites-track-users\"\u003EDo pirate streaming sites track users?\u003C\u002Fh3\u003E\u003Cp\u003EMany embed tracking scripts, such as Google Analytics or Meta Pixel, which can collect browsing data and associate activity with advertising profiles.\u003C\u002Fp\u003E\u003Ch3 id=\"can-children-see-gambling-or-adult-content-on-free-streaming-sites\"\u003ECan children see gambling or adult content on free streaming sites?\u003C\u002Fh3\u003E\u003Cp\u003EYes. Pirate platforms often display unfiltered betting ads, explicit banners, and pop-ups without age restrictions.\u003C\u002Fp\u003E\u003Ch3 id=\"what-is-the-safest-way-to-watch-live-sports-online\"\u003EWhat is the safest way to watch live sports online?\u003C\u002Fh3\u003E\u003Cp\u003EUse licensed streaming services available in your region and protect all devices with updated security software and parental controls.\u003C\u002Fp\u003E",tags:[{id:ap,name:W,slug:X,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:u,name:v,slug:w,profile_image:x,cover_image:y,bio:z,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a},{id:aq,name:ar,slug:as,profile_image:at,cover_image:a,bio:au,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:O,reading_time:10,url:av},{id:aw,title:ax,slug:ay,feature_image:az,featured:m,published_at:aA,custom_excerpt:a,html:"\u003Cp\u003E\u003Cem\u003EScammers waste no time exploiting global crises—and the Israel-Iran conflict is no exception. As news spreads, fraudsters quickly adapt their tactics to create urgency, fear, and emotional appeal. Understanding these crisis-driven scams is key to avoiding costly mistakes.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey Takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EIsrael-Iran crisis scams rely on recycled fraud tactics.\u003C\u002Fstrong\u003E Scammers use updated “Nigerian prince”-style emails with war-related narratives to make offers seem more believable.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EAdvance-fee fraud is the most common scheme.\u003C\u002Fstrong\u003E Victims are promised large sums, donations, or investments but must first send money or personal details.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EMultiple scam variations target different emotions.\u003C\u002Fstrong\u003E These include fake charities, military stories, inheritance claims, and urgent investment opportunities tied to the conflict.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003ECrisis events trigger spikes in phishing and scams.\u003C\u002Fstrong\u003E Attackers exploit fear and urgency, leading to a surge in malicious emails and messages during geopolitical instability.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"how-israel-iran-crisis-scams-work-and-how-to-avoid-them\"\u003EHow Israel-Iran Crisis Scams Work and How to Avoid Them\u003C\u002Fh2\u003E\u003Cp\u003EWhenever global tensions escalate, scammers are close by, adapting their pitches.\u003C\u002Fp\u003E\u003Cp\u003EAs headlines about the Israel\u002FUS-Iran conflict spread across news platforms, inboxes quietly began filling with something else: offers of multi-million-dollar donations, secret political funds, stranded military fortunes, and urgent investment opportunities tied to the war.\u003C\u002Fp\u003E\u003Cp\u003EWe’ve analyzed several variants already — at least seven distinct versions — all exploiting the same geopolitical crisis. Different characters. Different amounts. Same scam.\u003C\u002Fp\u003E\u003Cp\u003EAnd what we’re seeing suggests this may be only the beginning.\u003C\u002Fp\u003E\u003Ch2 id=\"key-findings\"\u003EKey Findings\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EBitdefender Antispam Lab researcher Viorel Zavoiu uncovered at least seven distinct scam email variants\u003C\u002Fstrong\u003E exploiting the Israel\u002FUS-Iran conflict\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EAll samples follow classic advance-fee fraud mechanics\u003C\u002Fstrong\u003E, despite their differing storylines\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EThe narratives appear recycled from older “Nigerian prince”–style templates\u003C\u002Fstrong\u003E, updated with current geopolitical references\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EExecution is sloppy and inconsistent\u003C\u002Fstrong\u003E, suggesting an early testing or prototype phase\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EMultiple emotional triggers are being tested\u003C\u002Fstrong\u003E, including charity, inheritance, military authority, urgency and investment opportunities\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EWe expect the emergence of more refined versions, including fake charity campaigns\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"the-seven-variations-we%E2%80%99ve-identified\"\u003EThe Seven Variations We’ve Identified\u003C\u002Fh2\u003E\u003Cp\u003EThe emails don’t follow a single storyline. Instead, they recycle multiple well-known fraud narratives, inserting references to the conflict to make them feel timely.\u003C\u002Fp\u003E\u003Cp\u003EAmong the samples analyzed:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EA supposed Powerball winner donating $2.5 million to “randomly selected individuals” to help displaced war victims\u003C\u002Fli\u003E\u003Cli\u003EA terminally ill man writing from his hospital bed, giving away €1.7 million before surgery\u003C\u002Fli\u003E\u003Cli\u003EA “government representative” seeking assistance to relocate $1.9 billion due to instability in Iran\u003C\u002Fli\u003E\u003Cli\u003EA lawyer claiming to represent the family of a deceased Iranian political figure killed in US–Israeli strikes\u003C\u002Fli\u003E\u003Cli\u003EA US Army general needing help moving consignment trunks out of Syria\u003C\u002Fli\u003E\u003Cli\u003EA US Airforce soldier stationed in Iran who allegedly discovered $25.8 million\u003C\u002Fli\u003E\u003Cli\u003EA Tehran-based investor seeking to relocate “huge capital” abroad due to airstrikes\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EOn the surface, the messages vary widely, but they are all classic advance-fee scams.\u003C\u002Fp\u003E\u003Ch3 id=\"here-are-some-of-the-narratives-used\"\u003EHere are some of the narratives used:\u003C\u002Fh3\u003E\u003Cp\u003E\u003Cstrong\u003EVersion 1:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cblockquote\u003EHello Friend,\u003Cbr\u003E&nbsp;\u003Cbr\u003EI apologize for intruding on your privacy in this way. I found your name listed in the Trade Centre Chambers of Commerce directory here in Syria. I am pleased to propose a business partnership with you. I only hope that your address is still valid.\u003Cbr\u003E&nbsp;\u003Cbr\u003EI am Major General [redacted], US Army, currently serving with a peacekeeping force in Syria, alongside US intervention troops.\u003Cbr\u003E&nbsp;\u003Cbr\u003EI have two consignment trunks that I want to move out of this war zone to a safe country due to the ongoing conflict between Israel\u002FUSA, and Iran. This is because the U.S. is planning to withdraw about 1,000 remaining troops from Syria after this conflict. I'll provide you with more details when I see your readiness to assist me in receiving and safeguarding them until I return, which is in less than two months.\u003Cbr\u003E&nbsp;\u003Cbr\u003EThanks for your acceptance. God bless you and America!!\u003C\u002Fblockquote\u003E\u003Cp\u003E\u003Cstrong\u003EVersion 2:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cblockquote\u003EDear Sir\u002FMa,\u003Cbr\u003E\u003Cbr\u003EMy name is [redacted], lawyer to the elder son of late President Ali Hosseini Khamenei (Mr.Meysam khamenei ).It is never a news that his father was called to mother earth 28 February 2026 &nbsp;due US-Israeli strikes.\u003Cbr\u003E\u003Cbr\u003EFor a clear picture, you can view the website below.\u003Cbr\u003E\u003Cbr\u003EWe are urgently in search for a trustworthy person who is ready to stand as a business partner and make claim of secret funds deposited by her late mother who dead three days after her husband with security company in Turkey and he is 100% ready to part with 70% with any interested person.\u003Cbr\u003E\u003Cbr\u003EAt this juncture, I &nbsp;strongly needed us to act fast, not to lose the funds to top officials of the security company in Turkey who are now raising eyebrows due to the present situation in Iran.\u003Cbr\u003E\u003Cbr\u003EUpon your response, I will be sending you a detailed understanding on this.\u003Cbr\u003EI wait to hear from you.\u003C\u002Fblockquote\u003E\u003Ch2 id=\"sloppy-execution-suggests-a-testing-phase\"\u003ESloppy Execution Suggests a Testing Phase\u003C\u002Fh2\u003E\u003Cp\u003EThe samples we reviewed are riddled with:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EGrammar mistakes\u003C\u002Fli\u003E\u003Cli\u003EInconsistent identities\u003C\u002Fli\u003E\u003Cli\u003ETimeline errors\u003C\u002Fli\u003E\u003Cli\u003EContradictions\u003C\u002Fli\u003E\u003Cli\u003ERecycled storylines straight out of early 2000s inheritance-style scam templates\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EIn some cases, the structure mirrors traditional “foreign official needing help moving funds” scams almost word-for-word, with only the geopolitical context swapped out.\u003C\u002Fp\u003E\u003Cp\u003EThis sloppiness is telling. It suggests this isn’t yet a polished, large-scale campaign. Instead, it looks like an early testing phase.\u003C\u002Fp\u003E\u003Cp\u003EFraudsters often push out multiple rough versions of a script to see which narrative generates replies. Once they identify the most effective emotional hook, they refine and scale it. In other words, these seven versions may be prototypes.\u003C\u002Fp\u003E\u003Ch2 id=\"why-use-war-as-a-hook\"\u003EWhy Use War as a Hook?\u003C\u002Fh2\u003E\u003Cp\u003EConflict creates the perfect emotional environment for fraud:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPeople are paying attention\u003C\u002Fli\u003E\u003Cli\u003ENews is evolving rapidly\u003C\u002Fli\u003E\u003Cli\u003EInformation is fragmented\u003C\u002Fli\u003E\u003Cli\u003EFear and sympathy are heightened\u003C\u002Fli\u003E\u003Cli\u003EFinancial instability feels plausible\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EBy referencing real events, scammers add just enough realism to anchor an otherwise unrealistic story.\u003C\u002Fp\u003E\u003Ch2 id=\"what-happens-if-someone-replies\"\u003EWhat Happens If Someone Replies?\u003C\u002Fh2\u003E\u003Cp\u003EThe first email is only the opening move.\u003C\u002Fp\u003E\u003Cp\u003EOnce a target responds, scammers typically escalate by:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ERequesting personal information\u003C\u002Fli\u003E\u003Cli\u003EAsking for “processing fees,” “clearance charges,” or “tax payments”\u003C\u002Fli\u003E\u003Cli\u003EIntroducing fake banks, lawyers, or security companies\u003C\u002Fli\u003E\u003Cli\u003EDemanding shipping costs for ATM cards or “consignment trunks”\u003C\u002Fli\u003E\u003Cli\u003EGrooming victims for prolonged financial exploitation\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EEven if no money is sent initially, personal data alone can be monetized or used for future attacks.\u003C\u002Fp\u003E\u003Ch2 id=\"expect-more-versions-and-charity-scams\"\u003EExpect More Versions  and Charity Scams\u003C\u002Fh2\u003E\u003Cp\u003EIf history repeats itself, this wave will evolve.\u003C\u002Fp\u003E\u003Cp\u003EMajor global events and crises have repeatedly triggered waves of fraud that piggyback on real-world suffering and humanitarian goodwill, and we’ve seen this pattern before:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EDuring the \u003Cstrong\u003EIsrael–Gaza conflict\u003C\u002Fstrong\u003E, scammers flooded inboxes with fake donation solicitations tied to the war narrative, promising victims could donate or benefit financially while exploiting the humanitarian crisis. \u003Cstrong\u003EBitdefender \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fspam-trends-of-the-week-spammers-piggyback-on-the-israel-gaza-war-to-plunder-donations\" rel=\"noreferrer\"\u003E\u003Cstrong\u003Edocumented\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E this trend\u003C\u002Fstrong\u003E early on and noted that, as the conflict continued, fraudsters adapted their stories and donation requests to the latest news updates.\u003C\u002Fli\u003E\u003Cli\u003EAfter the \u003Cstrong\u003Edevastating earthquakes in Turkey and Syria\u003C\u002Fstrong\u003E, cybercriminals were spotted taking advantage of people’s empathy by posing as charity representatives and asking for donations via fake organizations, just hours after the disaster struck. \u003Cstrong\u003EOur \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fcybercriminals-exploit-human-misery-in-earthquake-hit-turkey-and-syria-with-new-online-disaster-scam\" rel=\"noreferrer\"\u003E\u003Cstrong\u003Ereport\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E highlighted how quickly fraudsters began exploiting that crisis\u003C\u002Fstrong\u003E and warned that more misleading and fraudulent messages were likely to follow.\u003C\u002Fli\u003E\u003Cli\u003EDuring the \u003Cstrong\u003Ewar in Ukraine\u003C\u002Fstrong\u003E, Bitdefender Labs tracked increased scam and malicious activity leveraging the conflict, including charity-related phishing, “Nigerian prince”-style advance-fee fraud variations, and attempts to spread malware under the guise of humanitarian requests. \u003Cstrong\u003EOur \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fbitdefender-labs-sees-increased-malicious-and-scam-activity-exploiting-the-war-in-ukraine\" rel=\"noreferrer\"\u003E\u003Cstrong\u003Eanalysis\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E traced how cybercriminals quickly adapted to real-world events to target netizens’ empathy and trust.\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EGiven the unpolished nature of the current samples, we expect:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EMore refined language\u003C\u002Fli\u003E\u003Cli\u003EProfessionally spoofed domains\u003C\u002Fli\u003E\u003Cli\u003EFake charity websites\u003C\u002Fli\u003E\u003Cli\u003ESocial media amplification\u003C\u002Fli\u003E\u003Cli\u003EBetter-crafted impersonation of legitimate organizations\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EWhat we’re seeing now may be the testing stage before broader deployment.\u003C\u002Fp\u003E\u003Ch2 id=\"the-red-flags-remain-the-same\"\u003EThe Red Flags Remain the Same\u003C\u002Fh2\u003E\u003Cp\u003EEven when scammers update the storyline, the fundamentals rarely change:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EMassive sums offered to strangers\u003C\u002Fli\u003E\u003Cli\u003EUnsolicited contact\u003C\u002Fli\u003E\u003Cli\u003ERequests for personal details\u003C\u002Fli\u003E\u003Cli\u003EEmotional manipulation tied to global crises\u003C\u002Fli\u003E\u003Cli\u003EPressure to act quickly\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003ELegitimate governments, military officials, philanthropists and investors do not randomly email netizens offering millions of dollars.\u003C\u002Fp\u003E\u003Cp\u003EIf the message sounds like a dramatic war thriller involving secret funds and urgent relocation, it’s almost certainly fiction.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-stay-ahead-of-crisis-driven-scams\"\u003EHow to Stay Ahead of Crisis-Driven Scams\u003C\u002Fh2\u003E\u003Cp\u003EWhen major world events dominate the news, assume scammers are adapting.\u003C\u002Fp\u003E\u003Cp\u003EA few practical rules help:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ESlow down when urgency is used as leverage.\u003C\u002Fstrong\u003E\u003Cbr\u003EWar-based narratives are designed to override rational thinking.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003ENever share personal details with unknown contacts.\u003C\u002Fstrong\u003E\u003Cbr\u003EEven a simple reply confirms your email is active and monitored.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EVerify independently.\u003C\u002Fstrong\u003E\u003Cbr\u003EIf an email references breaking events, check trusted news outlets yourself.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EUse tools that analyze suspicious messages.\u003C\u002Fstrong\u003E\u003Cbr\u003EIf you’re unsure, free services like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fscamio\"\u003E\u003Cstrong\u003EBitdefender Scamio\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E can help evaluate suspicious messages before you engage.\u003C\u002Fp\u003E\u003Ch2 id=\"frequently-asked-questions-faq\"\u003EFrequently asked questions (FAQ)\u003C\u002Fh2\u003E\u003Ch3 id=\"what-are-5-of-the-most-current-scams\"\u003EWhat are 5 of the most current scams?\u003C\u002Fh3\u003E\u003Cp\u003EFive of the most current scams include:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EInvestment scams (especially high-return promises)\u003C\u002Fli\u003E\u003Cli\u003EPhishing and smishing attacks (emails and text messages)\u003C\u002Fli\u003E\u003Cli\u003EAI impersonation scams (voice cloning and deepfakes)\u003C\u002Fli\u003E\u003Cli\u003EJob and task scams (fake remote work offers)\u003C\u002Fli\u003E\u003Cli\u003EOnline shopping scams (fake stores and counterfeit goods)\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EGlobally, shopping, investment, and “unexpected money” scams are among the most common.\u003C\u002Fp\u003E\u003Ch3 id=\"what-are-the-top-10-scams\"\u003EWhat are the top 10 scams?\u003C\u002Fh3\u003E\u003Cp\u003EThe most widespread scams today include:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EPhishing emails and fake login pages\u003C\u002Fli\u003E\u003Cli\u003EInvestment scams\u003C\u002Fli\u003E\u003Cli\u003ERomance scams\u003C\u002Fli\u003E\u003Cli\u003EJob and task scams\u003C\u002Fli\u003E\u003Cli\u003EOnline shopping scams\u003C\u002Fli\u003E\u003Cli\u003ETech support scams\u003C\u002Fli\u003E\u003Cli\u003EImpersonation scams (banks, government, companies)\u003C\u002Fli\u003E\u003Cli\u003EPrize and lottery scams\u003C\u002Fli\u003E\u003Cli\u003ESubscription\u002Frenewal scams\u003C\u002Fli\u003E\u003Cli\u003EAI voice and deepfake scams\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThese scams often combine social engineering with new technologies like AI.\u003C\u002Fp\u003E\u003Ch3 id=\"what-are-the-biggest-scams-in-the-world\"\u003EWhat are the biggest scams in the world?\u003C\u002Fh3\u003E\u003Cp\u003EThe biggest scams globally are typically investment scams, impersonation scams, and large-scale online fraud operations. Investment scams alone generate billions in losses annually, with crypto-related fraud accounting for a major share of global scam revenue.\u003C\u002Fp\u003E\u003Cp\u003EOverall, scams cause hundreds of billions in losses worldwide each year, making them a major global cybercrime issue.\u003C\u002Fp\u003E\u003Ch3 id=\"what-are-the-top-5-scamming-countries\"\u003EWhat are the top 5 scamming countries?\u003C\u002Fh3\u003E\u003Cp\u003EThere is no official “top 5” list, but global reports and investigations frequently link large-scale scam operations to regions such as:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENigeria (advance-fee and romance scams)\u003C\u002Fli\u003E\u003Cli\u003EIndia (tech support and call center scams)\u003C\u002Fli\u003E\u003Cli\u003EChina (phishing, counterfeit, and large fraud networks)\u003C\u002Fli\u003E\u003Cli\u003ERussia (cybercrime and phishing operations)\u003C\u002Fli\u003E\u003Cli\u003ESoutheast Asia (Cambodia, Myanmar, Laos) (organized scam compounds)\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThese regions are often mentioned due to organized scam networks, though scams originate worldwide and are not limited to specific countries.\u003C\u002Fp\u003E",tags:[{id:B,name:C,slug:D,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:aB,name:P,slug:P,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:n,name:o,slug:p,profile_image:q,cover_image:a,bio:r,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:aC,reading_time:7,url:aD},{id:"69a1b1592fa53a9f2eef4453",title:"The ‘I Accidentally Reported You’ Discord Scam: What You Need to Know",slug:"discord-scam-accidentally-reported",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fdiscord_scam_i_reported_you.png",featured:c,published_at:"2026-02-27T17:25:46.000+02:00",custom_excerpt:bL,html:"\u003Cp\u003E\u003Cem\u003EScammers are targeting Discord users by manufacturing and exploiting the fear of losing their accounts. While it might seem like an unlikely scenario that wouldn’t work, the fact that this scam has stood the test of time suggests that enough people are falling victim.\u003C\u002Fem\u003E&nbsp;\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\n\u003Cli\u003EThe “I accidentally reported you” message is a widespread Discord scam.\u003C\u002Fli\u003E\n\u003Cli\u003EThe objective is account takeover, not dispute resolution.\u003C\u002Fli\u003E\n\u003Cli\u003EAttackers impersonate Discord support to extract verification codes.\u003C\u002Fli\u003E\n\u003Cli\u003EDiscord does not handle reports through private messages.\u003C\u002Fli\u003E\n\u003Cli\u003ENever share login codes or change account details at someone else’s request.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Cp\u003EIf someone messages you on Discord saying they accidentally reported your account, either for fraud, illegal purchases or some other reason, you are being targeted by a Discord scam, likely designed to trigger account takeover.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ECriminals use this fake story to create panic about account suspension or IP bans, and trick victims into sharing verification codes.\u003C\u002Fp\u003E\u003Ch2 id=\"what-is-the-%E2%80%98i-accidentally-reported-you%E2%80%99-discord-scam\"\u003EWhat is the ‘I accidentally reported you’ Discord scam\u003C\u002Fh2\u003E\u003Cp\u003EThe “I accidentally reported you” Discord scam is categorized as a social engineering attack. Someone in your list of friends will falsely claim that they reported your account for fraud. Depending on the complexity of the attack, the fraudster may direct you to contact a fake support representative to prevent you from losing access.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis Discord scam exploits existing trust and implies a sense of urgency. Since most people will likely never interact with Discord support, they won’t even know how to have that discussion.\u003C\u002Fp\u003E\u003Cp\u003EAs you can imagine, Discord never requires users to report through direct messages, and no moderation action involves contacting users through random accounts.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe ultimate goal of the scam is \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-gb\u002Fblog\u002Fhotforsecurity\u002Fwhat-is-account-takeover-ato\"\u003Eaccount takeover\u003C\u002Fa\u003E. Once attackers gain control, they can lock you out, impersonate you, and even use your profile to target additional victims. If they contact people in your friend list, it’s much easier to trick them when the conversation begins from a place of trust.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAlso, there’s a subset of Discord users that criminals specifically target: content creators. This is one of the main reasons why \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-no\u002Fconsumer\u002Fsecurity-for-creators\"\u003EBitdefender created a special security solution\u003C\u002Fa\u003E just for them.&nbsp;\u003C\u002Fp\u003E\u003Ch2 id=\"how-the-scam-works-step-by-step\"\u003EHow the scam works, step by step\u003C\u002Fh2\u003E\u003Cp\u003EThis Discord scam usually follows a consistent pattern of manipulation.\u003C\u002Fp\u003E\u003Cp\u003EInitially, someone you don’t actually know, often from a shared server, sends you a friend request and starts a casual conversation. In some cases, it can take months before they try to scam you, and even then, after numerous discussions.\u003C\u002Fp\u003E\u003Cp\u003ESuddenly, one day, they say they accidentally reported you and claim that Discord has warned you, and that your account and IP address will be banned. Keep in mind that this message may differ, but the underlying idea remains the same. They need to make you panic so that you’re not overly suspicious of what’s to come.\u003C\u002Fp\u003E\u003Cp\u003EThey might even provide fabricated evidence that’s usually a fake screenshot of a support email. They then redirect you to a supposed Discord support account, and that fake support profile contacts you and introduces “verification” steps.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThis is where the actual account takeover begins. The impersonator requests a verification code sent to your email or instructs you to modify your account details, sometimes under the guise of verifying your identity.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf you comply, they reset your password and simply take control. The compromise is only possible because the victim authorizes it. The attack is complete.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fscam-infografic.png\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1024\" height=\"1536\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F02\u002Fscam-infografic.png 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F02\u002Fscam-infografic.png 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fscam-infografic.png 1024w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Ch2 id=\"who-is-behind-this-discord-scam\"\u003EWho is behind this Discord scam?\u003C\u002Fh2\u003E\u003Cp\u003EThis Discord scam, like many others, typically originates from organized scam networks and opportunistic cybercriminals who specialize in account takeover operations. In fact, it would be foolish to believe that random people with nothing better to do are the actual attackers.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EMany attackers operate within fraudster communities, such as forums and the dark web, where they share scripts, fake screenshots and impersonation tactics. These kits allow even inexperienced scammers to launch effective Discord scam campaigns on their own.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESome of the more advanced kits, which can also include phishing websites, can be bought as ready-made products on the dark net.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003ESome threat actors monetize stolen accounts by reselling them. Others use them as infrastructure to distribute further scams, cryptocurrency fraud, phishing links, or malware.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EThe scam is powerful because it is simple. The criminals behind it don’t need advanced malware, coding skills or system exploits. They rely completely on psychological tricks to take over accounts on a large scale.\u003C\u002Fp\u003E\u003Ch2 id=\"what-scammers-want-from-you\"\u003EWhat scammers want from you\u003C\u002Fh2\u003E\u003Cp\u003EThe primary objective of this Discord scam is account takeover. If the attack was successful and they control your account, they can:\u003C\u002Fp\u003E\u003Cul\u003E\n\u003Cli\u003EChange credentials and permanently lock you out\u003C\u002Fli\u003E\n\u003Cli\u003EImpersonate you to scam your friends\u003C\u002Fli\u003E\n\u003Cli\u003EAccess saved payment information\u003C\u002Fli\u003E\n\u003Cli\u003EAbuse subscriptions or Nitro features\u003C\u002Fli\u003E\n\u003Cli\u003ESell your account if it has a certain age, rare usernames or server ownership\u003C\u002Fli\u003E\n\u003Cli\u003EIn some variations, attackers demand payment to “remove” the fabricated fraud report, turning the Discord scam into direct financial extortion.\u003C\u002Fli\u003E\n\u003Cli\u003EIf the user has a server or is a content creator, the criminals will sometimes resort directly to blackmail\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"how-to-know-the-message-is-fake\"\u003EHow to know the message is fake\u003C\u002Fh2\u003E\u003Cp\u003EUnderstanding how Discord handles moderation exposes this Discord scam immediately. In fact, they do have their own warning on their \u003Ca href=\"https:\u002F\u002Fsupport.discord.com\u002Fhc\u002Fen-us\u002Farticles\u002F24160905919511-My-Discord-Account-was-Hacked-or-Compromised?utm_source=chatgpt.com\"\u003Ewebsite\u003C\u002Fa\u003E if the user is curious enough to learn about the company policy.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EDiscord Staff will never contact users directly through the Discord app for support-related matters. If someone requests personal information, asks for payment, or urges you to change your login credentials, please do not comply and avoid further interaction.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cul\u003E\n\u003Cli\u003EDiscord doesn’t ask the reported users to contact staff via private messages\u003C\u002Fli\u003E\n\u003Cli\u003EDiscord employees don’t use random usernames to resolve supposed issues\u003C\u002Fli\u003E\n\u003Cli\u003ENo legitimate support process asks you to share verification codes\u003C\u002Fli\u003E\n\u003Cli\u003EIP bans do not depend on user-to-user mediation\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Cp\u003E&nbsp;If you ever have any doubts about a message you receive, you can contact Discord directly from the app or from the website.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EAs a rule of thumb, this applies to any kind of online message: if it combines urgency, authority, and account verification requests, it’s highly likely that you’re being targeted.\u003C\u002Fp\u003E\u003Ch2 id=\"what-to-do-if-you-receive-this-message\"\u003EWhat to do if you receive this message\u003C\u002Fh2\u003E\u003Cp\u003EIf you encounter this Discord scam, end the interaction immediately, block the sender, and report the account to Discord.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EIf your account isn’t already secure, enable two-factor authentication with an authenticator app and choose a unique password.&nbsp;\u003C\u002Fp\u003E\u003Cp\u003EOn the other hand, if you already shared a verification code, you should change your Discord password, warn your contacts about suspicious messages, and take the other steps described above.&nbsp;\u003C\u002Fp\u003E\u003Ch2 id=\"faq\"\u003EFAQ\u003C\u002Fh2\u003E\u003Col\u003E\u003Cli\u003EIs the “I accidentally reported you” message a real Discord warning?\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003ENo. It is a Discord scam designed to initiate account takeover.\u003C\u002Fp\u003E\u003Col start=\"2\"\u003E\u003Cli\u003EWhat is the main goal of this Discord scam?\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EThe primary goal is account takeover, often followed by financial abuse or the distribution of further scams.\u003C\u002Fp\u003E\u003Col start=\"3\"\u003E\u003Cli\u003ECan sharing a verification code really cause account takeover?\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EYes. Verification codes allow attackers to reset credentials and seize control of your account.\u003C\u002Fp\u003E\u003Col start=\"4\"\u003E\u003Cli\u003EWhy does this Discord scam spread so quickly?\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EAttackers use compromised accounts to target trusted contacts, creating exponential growth within Discord communities.\u003C\u002Fp\u003E\u003Col start=\"5\"\u003E\u003Cli\u003EWhat should I do if I’ve already given them a verification code?\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EImmediately change your login credentials if you still have access, warn your friends and report accounts involved in the scam.\u003C\u002Fp\u003E",tags:[{id:B,name:C,slug:D,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:u,name:v,slug:w,profile_image:x,cover_image:y,bio:z,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:bL,reading_time:5,url:"\u002Fblog\u002Fhotforsecurity\u002Fdiscord-scam-accidentally-reported\u002F"},{id:"6995bd852fa53a9f2eef3cc0",title:"Which Big Tech Companies Do You Trust (or Not)? We Asked Netizens",slug:"which-big-tech-companies-do-you-trust-or-not-we-asked-netizens",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fbig-tech-header.jpg",featured:c,published_at:"2026-02-18T15:44:13.000+02:00",custom_excerpt:a,html:"\u003Cp\u003E\u003Cem\u003EConsumers may depend on Big Tech every day, but trust in the companies behind the world’s most-used platforms is far from uniform. Bitdefender’s latest survey shows a widening gap between the services people rely on and the brands they actually trust with their personal data.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey Takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003EBitdefender’s consumer survey, covering more than 7,000 internet users across seven countries, found that trust in Big Tech is sharply divided by company type and platform category.\u003C\u002Fli\u003E\u003Cli\u003EGoogle, Microsoft, and Apple ranked among the most trusted tech companies, while X, TikTok, and OpenAI drew significantly more skepticism from respondents.\u003C\u002Fli\u003E\u003Cli\u003EMany consumers are especially reluctant to share financial data, photos, and location information with major tech platforms, reflecting broader privacy concerns.\u003C\u002Fli\u003E\u003Cli\u003EThe findings suggest that convenience still drives platform use, but growing concern over data handling, transparency, and regulation is reshaping how people think about trust online.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EOur latest \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fbitdefender-2025-consumer-cybersecurity-survey\"\u003E\u003Cstrong\u003E\u003Cem\u003EConsumer Cybersecurity Survey\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, polling over 7,000 internet users in seven countries, sheds light on how netizens feel about Big Tech — and what their habits reveal about trust online.\u003C\u002Fp\u003E\u003Cp\u003EWhen asked who they trust, survey respondents showed a split between legacy tech giants and newer platforms.\u003C\u002Fp\u003E\u003Ch2 id=\"divided-trust\"\u003EDivided trust\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003ETech incumbents like Google, Microsoft and Apple score relatively high in trust. Nearly nine in 10 say they trust \u003Cstrong\u003EGoogle (88%)\u003C\u002Fstrong\u003E or \u003Cstrong\u003EMicrosoft (85%)\u003C\u002Fstrong\u003E to some extent, and over three-quarters trust \u003Cstrong\u003EApple (77%)\u003C\u002Fstrong\u003E.\u003C\u002Fp\u003E\u003Cp\u003ESocial platforms and emerging AI-driven services like \u003Cstrong\u003EX\u002FTwitter, TikTok, and OpenAI\u003C\u002Fstrong\u003E rank among the \u003Cstrong\u003Eleast trusted\u003C\u002Fstrong\u003E. As our report notes:\u003C\u002Fp\u003E\u003Cblockquote\u003ESkepticism runs high toward newer or more controversial platforms. More than half of respondents say they don’t trust X\u002FTwitter (52%) or TikTok (51%) at all, and almost as many view OpenAI with suspicion (45%).\u003C\u002Fblockquote\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fchart-1-4.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1009\" height=\"492\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F02\u002Fchart-1-4.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F02\u002Fchart-1-4.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fchart-1-4.jpg 1009w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EWhile users still rely on these companies for communication, search, or hardware, confidence erodes when it comes to data collection, or opacity about how information is used.\u003C\u002Fp\u003E\u003Cp\u003EMost consumers draw the line at sharing financial information, with 59% saying they want to keep their credit card and payment data out of tech giants’ reach. Many also want to shield photos (20%) and location data (19%).\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fchart-2-7.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1010\" height=\"570\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F02\u002Fchart-2-7.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F02\u002Fchart-2-7.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fchart-2-7.jpg 1010w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003ETrust in ‘Big Tech’ looks different in various parts of the world. US consumers are less concerned about sharing certain categories like location data, with only 14% wanting to keep it private, compared to more than one in five in Spain and Italy.\u003C\u002Fp\u003E\u003Cp\u003EEuropeans also tend to be stricter about safeguarding personal details, shaped by years of GDPR-driven awareness. While US consumers focus on convenience, Europeans are more attuned to privacy — though both groups continue to rely on platforms they say they don’t fully trust.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fchart-3-2.jpg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"1041\" height=\"917\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2026\u002F02\u002Fchart-3-2.jpg 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw1000\u002F2026\u002F02\u002Fchart-3-2.jpg 1000w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F02\u002Fchart-3-2.jpg 1041w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003EWhy the skepticism? A few forces are converging.\u003C\u002Fp\u003E\u003Ch2 id=\"regulatory-pressure\"\u003ERegulatory pressure\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EAcross Europe in 2025, data protection authorities slapped major tech firms with roughly \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Feurope-tech-sector-eu1-2-billion-fines-gdpr-2025\"\u003E\u003Cstrong\u003E€1.2 billion in GDPR fines\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E, underscoring regulatory concerns about privacy compliance and transparency.\u003C\u002Fp\u003E\u003Cp\u003EMore recently, \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Feu-probe-grok-image-manipulation-x-recommender-system\"\u003E\u003Cstrong\u003Eregulators are probing platforms like X\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E (and its AI assistant \u003Cstrong\u003EGrok\u003C\u002Fstrong\u003E) over how AI capabilities could manipulate images or amplify harmful content — tapping into deep-rooted concerns about data use and trust.\u003C\u002Fp\u003E\u003Cp\u003EThese actions are part of broader efforts to \u003Cstrong\u003Erestore trust in the digital ecosystem\u003C\u002Fstrong\u003E by holding companies accountable for how they handle personal data — precisely the issues that worry many consumers.\u003C\u002Fp\u003E\u003Cp\u003ESuch investigations feed into a broader narrative: consumers want powerful tools, but they also want solid guardrails and assurances that their personal information won’t be misused.\u003C\u002Fp\u003E\u003Ch2 id=\"advice-for-consumers-how-to-act-on-what-you-don%E2%80%99t-trust\"\u003EAdvice for consumers: how to act on what you \u003Cem\u003Edon’t\u003C\u002Fem\u003E trust\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EWhether you’re cautious about Big Tech or simply want to protect yourself online, here are some practical steps you can take:\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E1. Manage your permissions\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EReview what data apps and platforms can access — especially location, contacts and camera — and revoke permissions you don’t need.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E2. Know what you share\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ECookies aren’t just annoyances. Taking a moment to \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fhow-do-you-manage-cookies-consumer-survey\"\u003E\u003Cstrong\u003Eunderstand cookie settings\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E can limit how much data tracks you across sites.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E3. Use strong, unique passwords\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAvoid reusing passwords across accounts. Use a password manager instead. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fpassword-manager\"\u003E\u003Cstrong\u003EBitdefender SecurePass\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E can generate and store secure credentials.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E4. Enable multi-factor authentication (MFA)\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EThis extra layer of security on your accounts makes unauthorized access much harder.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E5. Use independent security tools\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003EAntivirus, anti-phishing filters and identity protection services help catch threats early — especially on mobile devices. Deploy \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002F\"\u003E\u003Cstrong\u003Ean independent security solution\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E on all your personal devices.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E6. Stay informed about your rights\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ERegulations like \u003Cstrong\u003EGDPR\u003C\u002Fstrong\u003E and \u003Cstrong\u003ECCPA\u003C\u002Fstrong\u003E give you rights to access, correct, or delete your data — but you have to exercise them.\u003C\u002Fp\u003E\u003Cp\u003ETrust in Big Tech isn’t just about confidence — it’s about control, transparency and accountability. Consumers expect services to be useful \u003Cem\u003Eand\u003C\u002Fem\u003E respectful of their data. Regulators around the world are stepping in, but ultimately, informed users are the strongest defense against misuse. The digital world can be safe — as long as you know where trust ends and caution begins.\u003C\u002Fp\u003E\u003Ch2 id=\"frequently-asked-questions-faq\"\u003EFrequently asked questions (FAQ)\u003C\u002Fh2\u003E\u003Ch3 id=\"what-is-meant-by-big-tech\"\u003EWhat is meant by Big Tech?\u003C\u002Fh3\u003E\u003Cp\u003EBig Tech refers to the handful of massive technology companies that shape how people search, shop, communicate, work, and increasingly use AI. The term usually points to dominant firms such as Google, Apple, Meta, Amazon, and Microsoft because of their outsized influence over digital markets, platforms, and data.\u003C\u002Fp\u003E\u003Ch3 id=\"what-are-the-criticisms-of-big-tech\"\u003EWhat are the criticisms of Big Tech?\u003C\u002Fh3\u003E\u003Cp\u003EThe biggest complaints are familiar: too much market power, too much personal data collection, too little transparency, and not enough accountability when platforms amplify harmful content or make privacy-invasive decisions. Regulators have also warned that some large platforms rely on extensive user surveillance, weak privacy controls, and inadequate protections for children and teens.\u003C\u002Fp\u003E\u003Ch3 id=\"what-is-the-biggest-problem-with-technology\"\u003EWhat is the biggest problem with technology?\u003C\u002Fh3\u003E\u003Cp\u003EThere is no single answer, but the clearest recurring problem is that technology can scale risk as fast as it scales convenience. That risk often shows up as privacy erosion, cybersecurity exposure, manipulation, misinformation, and deeper dependence on systems most users cannot fully see or control.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also want to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fuse-mobile-security-app-ask-netizens-bitdefender-survey\"\u003E\u003Cstrong\u003E\u003Cem\u003EWhy Don’t You Use a Mobile Security App? We Asked Netizens\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fwhat-scares-people-about-hackers-survey\"\u003E\u003Cstrong\u003E\u003Cem\u003EWhat Scares People Most About Hackers? We Asked Netizens\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fhow-do-you-manage-cookies-consumer-survey\"\u003E\u003Cstrong\u003E\u003Cem\u003EHow Do You Manage Cookies While Browsing the Web? We Asked Netizens\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E",tags:[{id:E,name:s,slug:F,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:"66f50fb228045a04f10ce991",name:bM,slug:bN,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:I,name:J,slug:K,profile_image:L,cover_image:a,bio:M,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:"Consumers may depend on Big Tech every day, but trust in the companies behind the world’s most-used platforms is far from uniform. Bitdefender’s latest survey shows a widening gap between the services people rely on and the brands they actually trust with their personal data.\n\n\nKey Takeaways\n\n * Bitdefender’s consumer survey, covering more than 7,000 internet users across seven countries, found that trust in Big Tech is sharply divided by company type and platform category.\n * Google, Microsoft,",reading_time:H,url:"\u002Fblog\u002Fhotforsecurity\u002Fwhich-big-tech-companies-do-you-trust-or-not-we-asked-netizens\u002F"},{id:"69440f0a2fa53a9f2eef156e",title:"Streaming Subscription Scams: What Users Need to Know",slug:"streaming-subscription-scams-dark-net",feature_image:"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2025\u002F12\u002F51ae8402-f997-41c2-8867-1c932eaada64.png",featured:c,published_at:"2025-12-18T16:43:25.000+02:00",custom_excerpt:bO,html:"\u003Cp\u003E\u003Cem\u003EUsers searching for cheap entertainment are likely to stumble across Dark Net marketplaces that advertise “Lifetime Netflix Premium” for $2.99, “Hulu + Cinemax for €25”, or HBO Max bundles for the price of a coffee. \u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey Takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\u003Cli\u003E\u003Cstrong\u003EStreaming subscription scams thrive on stolen accounts.\u003C\u002Fstrong\u003E Cybercriminals sell access to platforms like Netflix or Prime Video using hacked credentials or fraudulent payment methods.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EDark web marketplaces mimic legitimate stores.\u003C\u002Fstrong\u003E These platforms use reviews, guarantees, and polished interfaces to appear trustworthy while distributing stolen or fake subscriptions.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003EPhishing campaigns are a primary entry point.\u003C\u002Fstrong\u003E Fake messages about billing issues or subscription renewals trick users into revealing login and payment details.\u003C\u002Fli\u003E\u003Cli\u003E\u003Cstrong\u003E“Too good to be true” deals are a major red flag.\u003C\u002Fstrong\u003E Deeply discounted or “lifetime” subscriptions often rely on fraud, putting both buyers and original account owners at risk.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"how-streaming-subscription-scams-work-and-how-to-avoid-them\"\u003EHow Streaming Subscription Scams Work and How to Avoid Them\u003C\u002Fh2\u003E\u003Cp\u003EThe offers look slick, professional and shockingly affordable.\u003C\u002Fp\u003E\u003Cp\u003EThe &nbsp;Dark Net listings mimic real e-commerce platforms, complete with vendor reputations, escrow options and support for cryptocurrency payments.\u003C\u002Fp\u003E\u003Cp\u003EBut behind these beautifully polished online stores lies an ecosystem built on stolen accounts, credit card fraud and scams targeting bargain hunters.\u003C\u002Fp\u003E\u003Cp\u003EBitdefender’s Dark Net \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fmirror-in-the-dark\"\u003Einvestigations\u003C\u002Fa\u003E show that streaming accounts are among the most traded consumer digital goods on underground markets.\u003C\u002Fp\u003E\u003Ch2 id=\"why-streaming-accounts-flood-the-darknet\"\u003EWhy streaming accounts flood the darknet\u003C\u002Fh2\u003E\u003Cp\u003EThe Dark Net isn’t inherently criminal, but it offers something that criminals look for more than anything else – anonymity.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003EAs Bitdefender \u003C\u002Fstrong\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fdark-net-sounds-mysterious-lets-see-whats-really-available-for-sale\" rel=\"noreferrer\"\u003E\u003Cstrong\u003Ereports\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003Cstrong\u003E:\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EDark Net marketplaces operate like full-featured e-commerce ecosystems.\u003C\u002Fli\u003E\u003Cli\u003EAnything illegal is likely for sale, and that includes accounts, stolen data and subscription services.\u003C\u002Fli\u003E\u003Cli\u003EScams are rampant – so much so that criminals defraud not only users but also each other.\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EStreaming services sit at a sweet spot within this complex ecosystem. They’re easy to acquire via phishing attacks, they are broadly desirable and are easy to resell in bulk.\u003C\u002Fp\u003E\u003Ch2 id=\"stolen-subscription-accounts-sold-for-pennies\"\u003EStolen subscription accounts sold for pennies\u003C\u002Fh2\u003E\u003Cp\u003EBitdefender’s report highlights that criminals sell:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENetflix, HBO, Apple TV+, Hulu, Disney+ accounts\u003C\u002Fli\u003E\u003Cli\u003EOften bundled or sold as “premium access”\u003C\u002Fli\u003E\u003Cli\u003EFrequently created using compromised credit cards\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EOn multiple Dark Net sites, these accounts cost between $5 and $15, though sometimes that price can drop as low as $2.99. The price in itself is a classic red flag, suggesting that it’s a scam.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2025\u002F12\u002Fimage-4.png\" class=\"kg-image\" alt=\"Streaming services sellting for just a few dollars on the Dark Net\" loading=\"lazy\" width=\"792\" height=\"314\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2025\u002F12\u002Fimage-4.png 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2025\u002F12\u002Fimage-4.png 792w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003ECriminals obtain these accounts through credential stuffing attacks, phishing campaigns, password reuse and stolen credit cards.\u003C\u002Fp\u003E\u003Cp\u003EIn fact, these transactions based on stolen credit cards are common in other industries as well. For example, \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fscammers-sell-steam-accounts-games\"\u003ESteam accounts\u003C\u002Fa\u003E are sometimes sold in the same way, to people who don’t know that buying such accounts they are becoming a small cog in a very large money laundering machine.\u003C\u002Fp\u003E\u003Cp\u003EThe trick is simple: the buyer may get login access only temporarily, if at all. When is he going to complain?\u003C\u002Fp\u003E\u003Cp\u003E\u003Cstrong\u003E“Lifetime accounts” that die in days\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\u003Cp\u003ESome of the listings promise incredible prices such as Lifetime Netflix Premium for $2.99, Hulu + Cinemax Premium for €25, and Disney+ UHD Lifetime for just €2.99.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2025\u002F12\u002Fimage-3.png\" class=\"kg-image\" alt=\"There's no lifetime account for streaming services\" loading=\"lazy\" width=\"1000\" height=\"491\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002Fsize\u002Fw600\u002F2025\u002F12\u002Fimage-3.png 600w, https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2025\u002F12\u002Fimage-3.png 1000w\" sizes=\"(min-width: 720px) 720px\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003ENo streaming platform offers “lifetime accounts,” which in itself should be suspicious. And criminals know that there are multiple reasons why those accounts will likely fail.\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EStolen credentials that will be reclaimed once the owner resets the password\u003C\u002Fli\u003E\u003Cli\u003EAccounts made with stolen cards, shut down after fraud checks\u003C\u002Fli\u003E\u003Cli\u003ENonfunctional logins designed to scam buyers from the start\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fdark-net-sounds-mysterious-lets-see-whats-really-available-for-sale\"\u003EBitdefender’s Dark Net Report\u003C\u002Fa\u003E warns that buyers often get scammed by other criminals, especially when prices appear too good to be true.\u003C\u002Fp\u003E\u003Ch2 id=\"how-users-can-protect-themselves-from-streaming-scams\"\u003EHow users can protect themselves from streaming scams\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Col\u003E\u003Cli\u003E\u003Cstrong\u003ENever buy digital accounts from third-party sellers\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EThese “deals” are illegal, unsafe and guaranteed to fail. Risks include:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ELosing money\u003C\u002Fli\u003E\u003Cli\u003EBecoming involved in credit-card fraud\u003C\u002Fli\u003E\u003Cli\u003EExposing your crypto wallet or personal information to criminals\u003C\u002Fli\u003E\u003Cli\u003EGetting malware from “activation tools”\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Col start=\"2\"\u003E\u003Cli\u003E\u003Cstrong\u003EProtect your own streaming accounts\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003ECybercriminals depend on weak security. Strengthen your accounts by:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EEnabling two-factor authentication (2FA) on all services that support it\u003C\u002Fli\u003E\u003Cli\u003EUsing unique, complex passwords for every account\u003C\u002Fli\u003E\u003Cli\u003EAvoiding reusing passwords – streaming logins are often cracked with credential dumps from data braches\u003C\u002Fli\u003E\u003Cli\u003EUse \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Ftotal-security\" rel=\"noreferrer\"\u003E\u003Cstrong\u003EBitdefender Total Security\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E to keep your devices safe\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Col start=\"3\"\u003E\u003Cli\u003E\u003Cstrong\u003EMonitor for data breaches\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EHuge databases containing stolen credentials, including from streaming accounts, are continuously traded online.\u003C\u002Fp\u003E\u003Cp\u003ETools like \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fconsumer\u002Fdigital-identity-protection\" rel=\"noreferrer\"\u003E\u003Cstrong\u003EBitdefender Digital Identity Protection\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E help you:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESee if your credentials ended up on the Dark Net\u003C\u002Fli\u003E\u003Cli\u003EGet alerted to data breaches\u003C\u002Fli\u003E\u003Cli\u003ECheck if your passwords or emails have been leaked\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Col start=\"4\"\u003E\u003Cli\u003E\u003Cstrong\u003EWatch your payment cards\u003C\u002Fstrong\u003E\u003C\u002Fli\u003E\u003C\u002Fol\u003E\u003Cp\u003EBecause many streaming scams are funded using stolen payment data, users must:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003EReview monthly statements\u003C\u002Fli\u003E\u003Cli\u003ECheck for unauthorized subscription charges\u003C\u002Fli\u003E\u003Cli\u003EImmediately report fraud to the bank\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Ch2 id=\"streaming-scam-faq\"\u003EStreaming scam FAQ\u003C\u002Fh2\u003E\u003Ch3 id=\"are-cheap-netflix-or-hulu-accounts-on-telegram-or-the-dark-net-legal\"\u003EAre cheap Netflix or Hulu accounts on Telegram or the Dark Net legal?\u003C\u002Fh3\u003E\u003Cp\u003ENo. These accounts are stolen or fraudulently created, making both selling and buying them illegal.\u003C\u002Fp\u003E\u003Ch3 id=\"can-a-%E2%80%9Clifetime%E2%80%9D-streaming-account-ever-be-real\"\u003ECan a “lifetime” streaming account ever be real?\u003C\u002Fh3\u003E\u003Cp\u003ENo legitimate streaming provider sells lifetime access. All such listings are scams.\u003C\u002Fp\u003E\u003Ch3 id=\"why-are-streaming-accounts-so-cheap-on-the-dark-net\"\u003EWhy are streaming accounts so cheap on the Dark Net?\u003C\u002Fh3\u003E\u003Cp\u003EBecause they cost criminals nothing—credentials come from breaches, phishing or stolen cards. If you buy one, you’ll likely lose access within days, get scammed entirely or unknowingly participate in criminal fraud.\u003C\u002Fp\u003E\u003Ch3 id=\"can-my-own-streaming-account-be-sold-by-criminals\"\u003ECan my own streaming account be sold by criminals?\u003C\u002Fh3\u003E\u003Cp\u003EYes. If your password was leaked in a breach, it can be bundled and sold\u003C\u002Fp\u003E",tags:[{id:B,name:C,slug:D,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:e,name:f,slug:d,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a},{id:l,name:g,slug:g,description:a,feature_image:a,visibility:b,og_image:a,og_title:a,og_description:a,twitter_image:a,twitter_title:a,twitter_description:a,meta_title:a,meta_description:a,codeinjection_head:a,codeinjection_foot:a,canonical_url:a,accent_color:a}],authors:[{id:u,name:v,slug:w,profile_image:x,cover_image:y,bio:z,website:a,location:a,facebook:a,twitter:a,meta_title:a,meta_description:a}],excerpt:bO,reading_time:H,url:"\u002Fblog\u002Fhotforsecurity\u002Fstreaming-subscription-scams-dark-net\u002F"}],page:1,limit:999,isLoading:c,filterString:t,blogname:bI,menuItems:{hotforsecurity:{en:[{tag:t,name:A},{tag:X,name:W},{tag:V,name:G},{tag:$,name:N},{tag:bN,name:bM},{tag:bP,name:bQ}],es:[{tag:t,name:A},{tag:"consejos-de-seguridad",name:"Consejos de Seguridad"},{tag:"noticias-de-la-industria",name:"Noticias de la industria"},{tag:"microempresas",name:"Microempresas"},{tag:"actualizaciones-de-productos",name:"Actualizaciones de productos"},{tag:"hogar-inteligente",name:"Hogar Inteligente"},{tag:bP,name:bQ}],ro:[{tag:t,name:A},{tag:V,name:G},{tag:$,name:N}],fr:[{tag:t,name:A},{tag:V,name:G},{tag:"conseils-astuces",name:"Conseils"},{tag:"maison-connectee",name:"Maison Connectée"},{tag:bR,name:"ABC CYBERSÉCURITÉ"}],de:[{tag:t,name:A},{tag:"branchennachrichten",name:"Nachrichten"},{tag:V,name:G},{tag:"tipps-und-tricks",name:"TIPPS"},{tag:$,name:N},{tag:bR,name:"ABC DER CYBERSICHERHEIT"}]},labs:{en:[{tag:t,name:A},{tag:"antimalware-research",name:"Anti-Malware Research"},{tag:"free-tools",name:"Free Tools"},{tag:"whitepapers",name:"Whitepapers"}]},businessinsights:{en:[{tag:t,name:A},{tag:"enterprise-security",name:"Enterprise Security"},{tag:"cloud-security",name:"Cloud Security"},{tag:"privacy-and-data-protection",name:"Privacy and Data Protection"}]}}}},error:a,state:{lang:d,primaryTag:bS,server:"http:\u002F\u002Flocalhost:3000\u002Fnuxt\u002Fapi",mainTag:bS,locale:"en-us"},serverRendered:m,routePath:"\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002F",config:{pageEnv:"prod",_app:{basePath:Z,assetsPath:"\u002Fnuxt\u002F_nuxt\u002F",cdnURL:a}}}}(null,"public",false,"en","66f50fb228045a04f10ce986","EN","top","66f50fb228045a04f10ce98a","Industry News","industry-news",3,"66f50fb228045a04f10ce992",true,"66d5cbea28045a04f10b89c1","Alina BÎZGĂ","abizga","http:\u002F\u002F2.gravatar.com\u002Favatar\u002F8438d6e3076d0baf471aec1235424fcf?s=512&d=mm&r=g","Alina is a history buff passionate about cybersecurity and anything sci-fi, advocating Bitdefender technologies and solutions. She spends most of her time between her two feline friends and traveling.","Digital Privacy","all","66d5cbea28045a04f10b89df","Silviu STAHIE","sstahie","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002FBD_Silviu_Stahie_Pic3-1.jpeg","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002FBD_Silviu_Stahie_Pic3.jpeg","Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.","All","66f50fb228045a04f10ce9b2","Scam","scam","66f50fb228045a04f10ce985","digital-privacy","Product Updates",4,"66d5cbea28045a04f10b89d0","Filip TRUȚĂ","ftruta","http:\u002F\u002F0.gravatar.com\u002Favatar\u002F377aeee1f02a7ae7ac62f20f2f4ce504?s=512&d=mm&r=g","Filip has 17 years of experience in technology journalism. In recent years, he has focused on cybersecurity in his role as a Security Analyst at Bitdefender.","Smart Home","Easy-to-find websites that promise free streaming can seem like a great deal, especially when subscription costs continue to rise. But they are rarely free in any real sense","alert","A woman in London says a man used smart glasses to secretly film her, then uploaded the footage to social media, and requested money to remove the video after she complained to him directly.","66f50fb228045a04f10ce9b3","Data Breach","data-breach","yearly","product-updates","Threats","threats","Consumer Insights","\u002F","hotforsecurity","smart-home","69b2b0472fa53a9f2eef4ca3","Safer Messaging for Kids: How to Set Up a Parent-Managed WhatsApp Account for Your Child","set-up-parent-managed-whatsapp-account-child","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fwhatsap-kids-child-manage-account.jpg","2026-03-12T15:01:44.000+02:00","66f50fb228045a04f10ce987","Family Safety","family","WhatsApp is rolling out a major new feature designed to make the world’s most popular messaging service safer for kids: parent-managed accounts.\n\n\nKey takeaways:\n\n\n * \n   \n   \n   WhatsApp is formally expanding into the pre-teen space with built-in parental oversight\n   \n\n * \n   \n   \n   Parent-managed accounts are designed with expert and family input\n   \n\n * \n   \n   \n   Parents retain control over privacy and contact permissions, while core protections like end-to-end encryption remain intact\n  ","\u002Fblog\u002Fhotforsecurity\u002Fset-up-parent-managed-whatsapp-account-child\u002F","69aa7efe2fa53a9f2eef482b","As F1 Returns, So Do the Risks of Free Streaming","f1-returns-risks-of-free-streaming","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002FGemini_Generated_Image_xyrhd9xyrhd9xyrh.png","2026-03-06T09:59:54.000+02:00","66f50fb228045a04f10ce990","69af74cd2fa53a9f2eef49b5","Andrei Anton-Aanei","andrei","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002Fprofile_pic.jpg","Andrei is a graduate in Automatic Control and Computer Engineering and an enthusiast exploring the field of Cyber Threat Intelligence.","\u002Fblog\u002Fhotforsecurity\u002Ff1-returns-risks-of-free-streaming\u002F","69a985392fa53a9f2eef476c","War as a Hook: How Fraudsters Are Using the Israel-Iran Crisis to Target Netizens","israel-iran-crisis-scams","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F03\u002FSpam-email-and-virus--concept--man-using-laptop-with-spam-email-icon---scammer---malware--virus.-1810551459_3866x2580.jpg","2026-03-05T15:42:27.000+02:00","66f50fb228045a04f10ce9aa","Scammers waste no time exploiting global crises—and the Israel-Iran conflict is no exception. As news spreads, fraudsters quickly adapt their tactics to create urgency, fear, and emotional appeal. Understanding these crisis-driven scams is key to avoiding costly mistakes.\n\n\nKey Takeaways\n\n * Israel-Iran crisis scams rely on recycled fraud tactics. Scammers use updated “Nigerian prince”-style emails with war-related narratives to make offers seem more believable.\n * Advance-fee fraud is the most ","\u002Fblog\u002Fhotforsecurity\u002Fisrael-iran-crisis-scams\u002F","69fdf30f2fa53a9f2eef6ffa","New fear: Man films woman with smart glasses, seeks money to take video down","man-films-woman-smart-glasses-money","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002FChatGPT-Image-May-8--2026--05_27_52-PM.png","2026-05-08T17:32:48.000+03:00","\u003Cp\u003E\u003Cem\u003EA woman in London says a man used smart glasses to secretly film her, then uploaded the footage to social media, and requested money to remove the video after she complained to him directly.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003EAccording to a BBC investigation, the footage received around 40,000 views before platforms began removing it. Police later confirmed they had opened an investigation into the incident.\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\u003Cul\u003E\n\u003Cli\u003EA woman in London says a man secretly filmed her using smart glasses and uploaded the footage to social media.\u003C\u002Fli\u003E\n\u003Cli\u003EThe woman later contacted the account and requested the removal of the video.\u003C\u002Fli\u003E\n\u003Cli\u003EAccording to the BBC, the man responded by offering to remove the video as a “paid service.”\u003C\u002Fli\u003E\n\u003Cli\u003ETikTok reportedly banned the account for violating its policies on bullying and harassment.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch1 id=\"woman-says-she-was-secretly-filmed-in-london\"\u003EWoman says she was secretly filmed in London\u003C\u002Fh1\u003E\u003Cp\u003EA woman in London says a man wearing smart glasses secretly filmed her during an interaction at a shopping center before uploading the footage to social media.\u003C\u002Fp\u003E\u003Cp\u003EAccording to a BBC \u003Ca href=\"https:\u002F\u002Fwww.bbc.com\u002Fnews\u002Farticles\u002Fcwy87wqz0q9o\"\u003Einvestigation\u003C\u002Fa\u003E, the woman, identified only as Alice (and not her real name), didn’t realize she was being recorded.\u003C\u002Fp\u003E\u003Cp\u003EAlice told the BBC she initially believed the man was simply attempting to speak with her. “In the moment I just thought ‘OK this guy is just trying to talk to me, to chat me up,’” she said.\u003C\u002Fp\u003E\u003Cp\u003EShe added that the man followed her while wearing the smart glasses and that she never saw a phone or a visible camera.\u003C\u002Fp\u003E\u003Cp\u003EThe BBC reported that the footage later appeared online and received around 40,000 views before Alice discovered it through a friend.\u003C\u002Fp\u003E\u003Ch2 id=\"video-reportedly-viewed-thousands-of-times\"\u003EVideo reportedly viewed thousands of times\u003C\u002Fh2\u003E\u003Cp\u003EAccording to the report, such videos often appear on social media accounts presenting themselves as dating advice or social content aimed at male audiences.\u003C\u002Fp\u003E\u003Cp\u003E“My initial reaction was complete shock,” she said. “He had no phone, he didn’t have a camera directly in my face.”\u003C\u002Fp\u003E\u003Cp\u003EThe BBC stated that multiple women have contacted the broadcaster about similar experiences involving covert filming and online posting without consent.\u003C\u002Fp\u003E\u003Ch2 id=\"request-to-remove-footage-led-to-payment-demand\"\u003ERequest to remove footage led to payment demand\u003C\u002Fh2\u003E\u003Cp\u003EAlice contacted the social media account responsible for posting the video and requested its removal. She told the BBC that the footage made her feel “humiliated.”\u003C\u002Fp\u003E\u003Cp\u003EShe received a response stating that the video could be removed as a “paid service.”\u003C\u002Fp\u003E\u003Cp\u003EThe man, later contacted by the BBC, said he didn’t intend to cause harm and described his content as “light-hearted” and “respectful.”\u003C\u002Fp\u003E\u003Cp\u003EWhen questioned about the payment request, he reportedly said the wording referred to “content-related requests” rather than a condition for removing content entirely.\u003C\u002Fp\u003E\u003Ch2 id=\"police-opened-an-investigation\"\u003EPolice opened an investigation\u003C\u002Fh2\u003E\u003Cp\u003EThe Metropolitan Police told the BBC an investigation was opened after the incident was reported. However, authorities said officers couldn’t advance the case due to limited information.\u003C\u002Fp\u003E\u003Cp\u003ELegal experts interviewed by the BBC expressed concern about the situation and the request for payment to remove online content.\u003C\u002Fp\u003E\u003Cp\u003EThe UK government also commented on the issue, stating that “women and girls deserve to feel safe” and that filming and sharing content online without consent “won’t be tolerated.”\u003C\u002Fp\u003E\u003Cp\u003ETikTok banned the account involved in the case for violating its rules on bullying and harassment. Meta also removed reposted versions of the video from its platforms.\u003C\u002Fp\u003E\u003Cp\u003EThe BBC additionally stated that it identified multiple accounts allegedly operated by the same individual across YouTube, Instagram, and Threads.\u003C\u002Fp\u003E\n\u003C!--kg-card-begin: html--\u003E\n\u003Cdiv style=\"background:#F9F9F9; border:1px solid #e5e5e5; border-radius:12px; padding:24px;\"\u003E\n  \u003Ch2\u003EFAQ\u003C\u002Fh2\u003E\n\n  \u003Ch3\u003EWhat happened in the smart glasses filming case in London?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E A woman told the BBC that a man secretly filmed her using smart glasses at a London shopping center and later uploaded the footage to social media.\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EDid the man ask for money to remove the video?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E According to the BBC investigation, the woman received a response stating the video could be removed as a “paid service.”\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EDid police investigate the incident?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E Yes. The Metropolitan Police said an investigation was opened but couldn’t progress due to limited information.\u003C\u002Fp\u003E\n\n  \u003Chr\u003E\n\n  \u003Ch3\u003EDid social media platforms remove the video?\u003C\u002Fh3\u003E\n  \u003Cp\u003E\u003Cstrong\u003EAnswer:\u003C\u002Fstrong\u003E The BBC reported that TikTok banned the account involved, while Meta removed reposted versions of the footage.\u003C\u002Fp\u003E\n\u003C\u002Fdiv\u003E\n\u003C!--kg-card-end: html--\u003E\n","\u002Fblog\u002Fhotforsecurity\u002Fman-films-woman-smart-glasses-money\u002F","69fde7872fa53a9f2eef6fe1","ClickFix Campaign Uses Compromised WordPress Sites to Spread Vidar Stealer in Australia","clickfix-compromised-wordpress-sites-vidar-stealer-australia","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fclickfix-vidar-stealer-australia-header.png","2026-05-08T16:42:19.000+03:00","\u003Cp\u003E\u003Cem\u003ECybercriminals are increasingly relying on social engineering instead of traditional exploits, and Australian authorities are warning that a spreading “ClickFix” campaign is a prime example.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EThe Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an advisory about an ongoing malware campaign targeting Australian infrastructure and organizations through compromised WordPress websites. The attacks use fake CAPTCHA or Cloudflare verification prompts to trick users into infecting their own systems with Vidar Stealer malware.\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Ch2 id=\"key-takeaways\"\u003EKey takeaways\u003C\u002Fh2\u003E\n\u003Cul\u003E\n\u003Cli\u003EThe ACSC is warning that threat actors are using compromised WordPress sites to distribute Vidar Stealer malware.\u003C\u002Fli\u003E\n\u003Cli\u003EThe campaign relies on the “ClickFix” social engineering technique, which tricks users into manually executing malicious commands.\u003C\u002Fli\u003E\n\u003Cli\u003EVictims are shown fake Cloudflare or CAPTCHA verification pages that copy malware commands to the clipboard.\u003C\u002Fli\u003E\n\u003Cli\u003EVidar Stealer targets passwords, browser cookies, cryptocurrency wallets, and other sensitive information.\u003C\u002Fli\u003E\n\u003Cli\u003EClickFix campaigns are spreading rapidly because they bypass many traditional security controls by exploiting user trust instead of software vulnerabilities.\u003C\u002Fli\u003E\n\u003C\u002Ful\u003E\n\u003Ch2 id=\"what-is-clickfix\"\u003EWhat is ClickFix?\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fthe-clickfix-scam-infect-your-own-mac\"\u003E\u003Cstrong\u003EClickFix\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E is a relatively new social engineering tactic that has gained traction among cybercriminals over the past two years. Instead of silently exploiting vulnerabilities, attackers persuade users to run malicious commands themselves.\u003C\u002Fp\u003E\u003Cp\u003ETypically, victims encounter a fake verification page masquerading as a CAPTCHA, browser check, or Cloudflare protection screen. The page instructs users to copy and paste a command into Windows Run, PowerShell, or Terminal to “verify” they are human or resolve a supposed technical issue.\u003C\u002Fp\u003E\u003Cp\u003EIn the campaign flagged by the ACSC, attackers compromised legitimate Australian WordPress websites and injected them with malicious JavaScript. Once users visit the sites, they are redirected to fake verification prompts that deliver the malware chain.\u003C\u002Fp\u003E\u003Cp\u003EMicrosoft has warned that ClickFix attacks have become increasingly popular because they rely on “human intervention” rather than traditional malware delivery techniques, helping attackers evade some automated defenses.\u003C\u002Fp\u003E\u003Ch2 id=\"vidar-stealer-remains-a-major-threat\"\u003EVidar Stealer remains a major threat\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EThe payload delivered in this campaign is Vidar Stealer, a malware-as-a-service (MaaS) information stealer active since 2018.\u003C\u002Fp\u003E\u003Cp\u003EVidar is designed to harvest:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ESaved browser credentials\u003C\u002Fli\u003E\u003Cli\u003ESession cookies\u003C\u002Fli\u003E\u003Cli\u003ECryptocurrency wallet data\u003C\u002Fli\u003E\u003Cli\u003EAutofill information\u003C\u002Fli\u003E\u003Cli\u003ESystem details\u003C\u002Fli\u003E\u003Cli\u003EFiles from infected devices\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EThe malware is especially dangerous because stolen browser session cookies sometimes let attackers bypass passwords and even multi-factor authentication sessions. Once collected, the data is typically sold on cybercrime marketplaces or used in follow-on attacks.\u003C\u002Fp\u003E\u003Cp\u003EAccording to the ACSC, Vidar tries to reduce forensic traces by deleting its executable after launching and operating primarily in memory. The malware retrieves command-and-control infrastructure through “dead-drop” resolvers hosted on legitimate services such as Telegram bots and Steam profiles.\u003C\u002Fp\u003E\u003Ch2 id=\"compromised-wordpress-sites-are-fueling-the-campaign\"\u003ECompromised WordPress sites are fueling the campaign\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003ESecurity researchers have \u003Ca href=\"https:\u002F\u002Fcybernews.com\u002Fsecurity\u002Fhackers-wordpress-clickfix-captcha-infostealer-campaign\u002F\"\u003Eobserved\u003C\u002Fa\u003E a broader global trend involving the weaponization of compromised WordPress sites to deliver ClickFix malware.\u003C\u002Fp\u003E\u003Cp\u003EResearchers said they identified more than 250 infected websites across at least 12 countries, including Australia, the United States, the United Kingdom, Germany, and Canada. Many of the sites belonged to legitimate businesses and organizations, increasing the credibility of the malicious prompts shown to visitors.\u003C\u002Fp\u003E\u003Cp\u003EAttackers may be gaining access through stolen administrator credentials, exposed admin panels, vulnerable plugins, or weak password protections. The scale and automation of the campaign point to an organized criminal operation rather than opportunistic attackers.\u003C\u002Fp\u003E\u003Ch2 id=\"why-these-attacks-work-so-well\"\u003EWhy these attacks work so well\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EClickFix attacks exploit something security tools often struggle to detect: user behavior.\u003C\u002Fp\u003E\u003Cp\u003EInstead of downloading a malicious attachment or exploiting a browser vulnerability, the victim willingly executes the malicious command. That makes the activity look more legitimate and can help attackers bypass security filters and endpoint protections.\u003C\u002Fp\u003E\u003Cp\u003EThe fake CAPTCHA and Cloudflare prompts also capitalize on familiarity. People encounter verification checks constantly online, making the malicious requests appear routine and trustworthy.\u003C\u002Fp\u003E\u003Ch2 id=\"how-to-stay-safe\"\u003EHow to stay safe\u003C\u002Fh2\u003E\u003Cp\u003E\u003C\u002Fp\u003E\u003Cp\u003EOrganizations and individuals should treat any website asking them to manually run commands on their systems as a major red flag.\u003C\u002Fp\u003E\u003Cp\u003ESecurity experts recommend users:\u003C\u002Fp\u003E\u003Cul\u003E\u003Cli\u003ENever copy and run commands from websites you don’t fully trust\u003C\u002Fli\u003E\u003Cli\u003EKeep WordPress installations, plugins, and themes fully updated\u003C\u002Fli\u003E\u003Cli\u003EUse strong, unique passwords and enable multi-factor authentication for admin accounts\u003C\u002Fli\u003E\u003Cli\u003ERestrict PowerShell and scripting tools where possible\u003C\u002Fli\u003E\u003Cli\u003ETrain employees to recognize fake CAPTCHA and verification prompts\u003C\u002Fli\u003E\u003Cli\u003EUse layered security solutions that can detect infostealers and suspicious behavior\u003C\u002Fli\u003E\u003C\u002Ful\u003E\u003Cp\u003EBecause info-stealing malware is designed to silently harvest credentials and session tokens, early detection is critical. \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fsmall-business\u002F\"\u003E\u003Cstrong\u003EA modern security solution\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E with anti-phishing, web protection, and behavioral threat detection can help stop these attacks before sensitive data is compromised.\u003C\u002Fp\u003E\u003Cp\u003E\u003Cem\u003EYou may also want to read:\u003C\u002Fem\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fthe-clickfix-scam-infect-your-own-mac\"\u003E\u003Cstrong\u003E\u003Cem\u003EThe Scam That Tricks You Into Infecting Your Own Mac\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Ffour-years-in-prison-for-cybersecurity-pros-turned-ransomware-attackers\" rel=\"noreferrer\"\u003E\u003Cstrong\u003E\u003Cem\u003EFour Years in Prison for Cybersecurity Pros Turned Ransomware Attackers\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E\u003Cp\u003E\u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Ffbi-cybercrime-losses-21-billion-2025-ai\"\u003E\u003Cstrong\u003E\u003Cem\u003EFBI: Cybercrime Losses Hit a Record $21 Billion Last Year, Fueled by AI\u003C\u002Fem\u003E\u003C\u002Fstrong\u003E\u003C\u002Fa\u003E\u003C\u002Fp\u003E","66f50fb228045a04f10ce9b5","Very Small Business","very-small-business","Cybercriminals are increasingly relying on social engineering instead of traditional exploits, and Australian authorities are warning that a spreading “ClickFix” campaign is a prime example.\n\nThe Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an advisory about an ongoing malware campaign targeting Australian infrastructure and organizations through compromised WordPress websites. The attacks use fake CAPTCHA or Cloudflare verification prompts to trick u","\u002Fblog\u002Fhotforsecurity\u002Fclickfix-compromised-wordpress-sites-vidar-stealer-australia\u002F","69fde6b02fa53a9f2eef6fd0","Inside Department 4: Russia's secret school for hackers","inside-department-4-russias-secret-school-for-hackers","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fdepartment-4.jpeg","2026-05-08T16:36:45.000+03:00","\u003Cp\u003EMost universities have a careers fair. At Bauman Moscow State Technical University, however, an elite group of students appear to have something rather more unusual: a direct pipeline into some of the world's most notorious state-sponsored hacking groups.\u003C\u002Fp\u003E\u003Cp\u003EA new investigation by a consortium of journalists from \u003Ca href=\"https:\u002F\u002Fwww.theguardian.com\u002Fworld\u002F2026\u002Fmay\u002F07\u002Frevealed-russia-top-secret-spy-school-hacking-western-electoral-interference\"\u003E\u003Cem\u003EThe Guardian\u003C\u002Fem\u003E\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.spiegel.de\u002Fausland\u002Frussland-bildet-in-geheimem-uni-programm-spione-und-hacker-fuer-hybriden-krieg-aus-a-2de79023-aa56-4ed6-b5de-d7c222402e63\"\u003E\u003Cem\u003EDer Spiegel\u003C\u002Fem\u003E\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.lemonde.fr\u002Fen\u002Fm-le-mag\u002Farticle\u002F2026\u002F05\u002F07\u002Fmoscow-s-bauman-university-the-clandestine-school-training-russian-hackers_6753208_117.html\"\u003E\u003Cem\u003ELe Monde\u003C\u002Fem\u003E\u003C\u002Fa\u003E, and \u003Ca href=\"https:\u002F\u002Ftheins.press\u002Fen\u002Finv\u002F292314\"\u003E\u003Cem\u003EThe Insider\u003C\u002Fem\u003E\u003C\u002Fa\u003E, amongst others, has lifted the lid on a secretive faculty inside one of Russia's most prestigious technical universities - that has spent years grooming students to become hackers for Russian military intelligence.\u003C\u002Fp\u003E\u003Cp\u003EReporters managed to obtain a haul of 2,000 internal documents which revealed some of the secret goings-on, including at \"Department 4\" - a faculty with a seemingly deliberately unmemorable name within Bauman's military training centre, where the GRU appears to go shopping for fresh talent.\u003C\u002Fp\u003E\u003Cfigure class=\"kg-card kg-image-card\"\u003E\u003Cimg src=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fdepartment-4-presentation.jpeg\" class=\"kg-image\" alt=\"\" loading=\"lazy\" width=\"600\" height=\"338\" srcset=\"https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2026\u002F05\u002Fdepartment-4-presentation.jpeg 600w\"\u003E\u003C\u002Ffigure\u003E\u003Cp\u003ERussia's military intelligence service, the GRU, directly controls who gets into Department 4, according to the leak. It is GRU that is overseeing exams, and signing-off on graduates' postings, with some promising students scouted as early as secondary school.\u003C\u002Fp\u003E\u003Cp\u003EA core course called \"Defence against technical reconnaissance\" covers password attacks, software vulnerabilities, and trojan horses. Students are told to carry out practical penetration tests, and one module is devoted entirely to computer viruses, with students required to write a virus of their own as part of the assessment. Presumably they gain extra marks for not infecting their lecturer's laptop.\u003C\u002Fp\u003E\u003Cp\u003EIn addition, there are lessons in old fashioned James Bond-style spying with surveillance devices disguised as smoke detectors, physical keyloggers, and cables that silently send screenshots to a hidden drive.\u003C\u002Fp\u003E\u003Cp\u003EAmong the 69 students who reportedly graduated from Department 4 in 2024 was Daniil Porshin. He spent six years at Bauman, achieving near-perfect grades. Upon his graduation, he is said to have been assigned to the Fancy Bear hacking group, which was linked by the US Department of Justice over the high profile \u003Ca href=\"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FDemocratic_National_Committee_cyber_attacks\"\u003Ehack of the Democratic National Committee\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EFifteen other students found themselves assigned to hacking gangs, including one who appears to have been assigned to Unit 74455 (better known as Sandworm) - the GRU group which has been blamed by Western governments for \u003Ca href=\"https:\u002F\u002Fwww.reuters.com\u002Farticle\u002Fus-ukraine-cybersecurity-sandworm-idUSKBN0UM00N20160108\u002F\"\u003Eattacks on Ukraine's power grid\u003C\u002Fa\u003E, \u003Ca href=\"https:\u002F\u002Fwww.theguardian.com\u002Fworld\u002F2025\u002Fapr\u002F29\u002Ffrance-says-russian-hackers-behind-attack-on-macrons-2017-presidential-campaign\"\u003EEmmanuel Macron's 2017 presidential campaign\u003C\u002Fa\u003E, and the \u003Ca href=\"https:\u002F\u002Fwww.bitdefender.com\u002Fen-us\u002Fblog\u002Fhotforsecurity\u002Fncsc-says-gru-operatives-attacked-2018-and-2020-olympic-and-paralympic-games\"\u003E2018 Winter Olympics\u003C\u002Fa\u003E.\u003C\u002Fp\u003E\u003Cp\u003EIt is worth noting that not everyone makes the grade, with one student assessed by a senior GRU officer to have \"insufficient understanding of how to carry out a remote network attack.\"\u003C\u002Fp\u003E\u003Cp\u003EAccording to the documents, one of Department 4's teachers is Major General Viktor Netyksho. If that name is familiar to you, it may be because he was \u003Ca href=\"https:\u002F\u002Fwww.justice.gov\u002Farchives\u002Fopa\u002Fpr\u002Fgrand-jury-indicts-12-russian-intelligence-officers-hacking-offenses-related-2016-election\"\u003Eindicted by Robert Mueller\u003C\u002Fa\u003E over the DNC breach. He has, it seems, gone from running the Fancy Bear hacking group to helping train its replacements.\u003C\u002Fp\u003E\u003Cp\u003EWhat the report does is act as a useful reminder that the threat posed by groups like Fancy Bear and Sandworm is serious and organised. Russia is running a state-funded, state-directed production line for hackers - complete with lecture theatres, examination boards, and a steady supply of fresh recruits.\u003C\u002Fp\u003E\u003Cp\u003EAll of this means that those responsible for securing their organisations from cybercriminals cannot afford to relax.\u003C\u002Fp\u003E\u003Cp\u003EPatch your systems, enable multi-factor authentication, segment your network, log activity, train your workforce, make regular backups, run penetration tests against your organisation to see where your weak points may be, and so forth.\u003C\u002Fp\u003E\u003Cp\u003EDetermined GRU-trained hackers, hell-bent on breaking into your organisation's IT infrastructure, may still find it impossible to find a way in - but make sure you have done everything in your power to make it as difficult for them as possible, and limit any damage they might be able to cause.\u003C\u002Fp\u003E","66d5cbea28045a04f10b89d1","Graham CLULEY","gcluley","http:\u002F\u002F2.gravatar.com\u002Favatar\u002F5fdc27b8b6f6fd69e77aa017a53cceb5?s=512&d=mm&r=g","Graham Cluley is an award-winning security blogger, researcher and public speaker.  He has been working in the computer security industry since the early 1990s.","Most universities have a careers fair. At Bauman Moscow State Technical University, however, an elite group of students appear to have something rather more unusual: a direct pipeline into some of the world's most notorious state-sponsored hacking groups.\n\nA new investigation by a consortium of journalists from The Guardian, Der Spiegel, Le Monde, and The Insider, amongst others, has lifted the lid on a secretive faculty inside one of Russia's most prestigious technical universities - that has s","\u002Fblog\u002Fhotforsecurity\u002Finside-department-4-russias-secret-school-for-hackers\u002F",2,"News, views and insights from the Bitdefender experts","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002Fcontent\u002Fimages\u002F2021\u002F05\u002Fh4s_2x.png","#15171A","https:\u002F\u002Fstatic.ghost.org\u002Fv3.0.0\u002Fimages\u002Fpublication-cover.png","bitdefender","@bitdefender","Europe\u002FAthens","Home","Cybersecurity News","\u002Ftag\u002Fpeople-of-bitdefender\u002Findustry-news\u002F","\u002Ftag\u002Fdigital-privacy\u002F","\u002Ftag\u002Fsmart-home\u002F","How To","\u002Ftag\u002Fhow-to\u002F","\u002Ftag\u002Fproduct-updates\u002F","noreply","icon-and-text","Subscribe","free","monthly","off","hotforsecurity@bitdefender.com","noreply@blogapp.bitdefender.com","disabled","https:\u002F\u002Fblogapp.bitdefender.com\u002Fhotforsecurity\u002F","5.101",{},"fr","The official Ubuntu account on X (formerly Twitter) was briefly compromised by unknown attackers who used it to promote a fake AI agent and send people to a well-built website where they could share their crypto wallet.","Scammers are targeting Discord users by manufacturing and exploiting the fear of losing their accounts. While it might seem like an unlikely scenario that wouldn’t work, the fact that this scam has stood the test of time suggests that enough people are falling victim. ","Tips and Tricks","tips-and-tricks","Users searching for cheap entertainment are likely to stumble across Dark Net marketplaces that advertise “Lifetime Netflix Premium” for $2.99, “Hulu + Cinemax for €25”, or HBO Max bundles for the price of a coffee. ","vpn","VPN","abc",""));</script></body></html>