This Week in Scams: $16.6 Billion Lost, Deepfakes Rise, and Google Email Scams Emerge | McAfee Blog

This Week in Scams: .6 Billion Lost, Deepfakes Rise, and Google Email Scams Emerge | McAfee Blog

Welcome to the first edition of This Week in Scams, a new weekly series from McAfee breaking down the latest fraud trends, headlines, and real-time threats we’re detecting across the digital landscape.  This week, we’re spotlighting the FBI’s shocking new cybercrime report, the rise of AI-generated deepfakes, and a sophisticated Gmail impersonation scam flagged by Google. We’re also seeing a surge in location-specific toll scams and fake delivery alerts—a reminder that staying ahead of scammers…

Read More

Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor

Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor

Falco was blind to Curing, while Defender was unable to detect either Curing or a range of other common malware. Tetragon, on the other hand, was able to detect io_uring, but only when using Kprobes and LSM hooks, which Armo said are not used by default. According to Armo, the problem with all three is an over-reliance on Extended Berkeley Packet Filter (eBPF) based agents, which monitor system calls as a simple approach to gaining…

Read More

SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability

SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability

Attackers have been exploiting a critical zero-day vulnerability in the Visual Composer component of the SAP NetWeaver application server since early this week. SAP released an out-of-band fix that’s available through its support portal and it should be applied immediately, especially on systems that are directly exposed to the internet. “Unauthenticated attackers can abuse built-in functionality to upload arbitrary files to an SAP NetWeaver instance, which means full remote code execution and total system compromise,”…

Read More

Lenovo targets AI workloads with massive storage update

Lenovo targets AI workloads with massive storage update

These systems are aimed at enterprises that want to use both AI and virtualized systems, since AI hardware is not virtualized but bare-metal. For example, the all-new Lenovo ThinkAgile Converged Solution for VMware, which combines the enterprise-class features of the ThinkAgile VX Series with the data-management capabilities of the ThinkSystem DG Series storage arrays in a single package, Lenovo stated. For high-performance AI reasoning applications, Lenovo’s new ThinkAgile HX Series GPT-in-a-Box solution claims to be…

Read More

Girls Power Tech Inspires the Next Generation of Tech Leaders

Girls Power Tech Inspires the Next Generation of Tech Leaders

The future of technology is bright, especially after the resounding success of the 7th annual Cisco Girls Power Tech, held at the Cisco campus in Richardson, Texas, on April 17, 2025! Girls Power Tech Leaders This impactful event connected 73 bright young students with the vast potential of STEM, supported by 13 dedicated educators. These talented participants hail from Cisco Networking Academy schools, a strategic partnership that allows us to effectively reach and inspire the…

Read More

Researchers sound alarm: How a few secretive AI companies could crush free society

Researchers sound alarm: How a few secretive AI companies could crush free society

Andriy Onufriyenko/Getty Images Most of the research surrounding the risks to society of artificial intelligence tends to focus on malicious human actors using the technology for nefarious purposes, such as holding companies for ransom or nation-states conducting cyber-warfare. A new report from the security research firm Apollo Group suggests a different kind of risk may be lurking where few look: inside the companies developing the most advanced AI models, such as OpenAI and Google. Disproportionate…

Read More

The best push mowers of 2025: Expert picks from Cub Cadet, Makita, and more

The best push mowers of 2025: Expert picks from Cub Cadet, Makita, and more

We’re well into Spring, which means it’s time to start prepping your lawn for Summer gatherings with friends and family. Just like riding mowers, the right push mower can make all the difference in how you care for your lawn, with both gas and battery-powered options, self-propelled models, and multiple configurations for mulching and bagging. Brands like Toro, Cub Cadet, and DeWalt have options for yards as small as a quarter of an acre all…

Read More

Invest in AI search as an enterprise business asset

Invest in AI search as an enterprise business asset

Nearly every enterprise is experimenting with AI, but an overwhelming 90% of AI projects never scale beyond the proof-of-concept stage, and more than 97% of organizations experience difficulties demonstrating the business value of generative AI (genAI), according to an Informatica survey.[i] A major reason is that many cautious business leaders treat AI as a source of incremental improvements to existing processes rather than a tool to reshape core business functions. Too often, business leaders underestimate the people, behavior,…

Read More

Samsung Galaxy S25 Ultra vs. Google Pixel 9 Pro XL: We tested both and it's a close one

Samsung Galaxy S25 Ultra vs. Google Pixel 9 Pro XL: We tested both and it's a close one

Kerry Wan and Prakhar Khanna/ZDNET At Unpacked 2025 earlier this year, Samsung unveiled its big, bad flagship smartphone — the Galaxy S25 Ultra. The mobile device brought several improvements, including a lighter design, a custom-made Snapdragon 8 Elite chipset, and a revamped camera system. With further testing, we found it to be the best Samsung phone money can buy, but one question remains: how does it stack up against the best Android phones? Also: I replaced my iPhone…

Read More

Frontline lessons: What cybersecurity leaders can learn from attacks

Frontline lessons: What cybersecurity leaders can learn from attacks

In cybersecurity, confidence can be a liability. I’ve seen organizations of all sizes assume they’re safe — until an attack proves otherwise. As threats grow more sophisticated, companies pour time and money into defending their systems. But too often, they focus on the wrong things, like fixing vulnerabilities that are not critical to operations, and reality catches them off guard. Cyber resilience isn’t about checking boxes — it’s about whether your business can survive, recover,…

Read More
1 2 3 4,264