There is a new tech support scam that utilizes Microsoft's brand name to trick users into providing sensitive credentials. The scam starts with a seemingly innocuous email that purports to be a payment notice from a non-existent "Syria Rent a Car" firm. After the user clicks on the link, they are directed to an imposter CAPTCHA page, which is meant to trick both the user and security scanners. Once past the CAPTCHA, victims are taken to an imitation ransomware attack page, including frozen cursor and dire Microsoft-branded pop-ups. This false security notice coerces users into dialing a bogus Microsoft support hotline, where attackers try to harvest login information or install remote desktop software in order to control the victim's machine. The fraud takes advantage of the faith that users have on the Microsoft brand, employing social engineering techniques that promote a sense of urgency and alarm. By emulating a ransomware situation and visibly showing Microsoft's logo, attackers make victims think their computer is infected and that only dialing a "Microsoft Support" number can rectify the situation. This tactic works very well among less technically oriented users who presuppose any call that is described as "Microsoft Support" to be real. In order to guard against these types of attacks, both the users and organizations must apply robust email filtering to identify phishing emails and links. They must also educate themselves about being skeptical of unsolicited payment alerts and sudden tech support calls. In addition, use of endpoint security capable of identifying abnormal browser activities and fake lock screens, as well as keeping incident response policies up to date, can be useful to guard against these kinds of attacks.
Phoenix Contact this week released firmware updates for its QUINT4 uninterruptible power supply (UPS) EtherNet/IP product line to address five vulnerabilities disclosed by CyberDan...
Microsoft has released a critical security update to address what is being described as the most severe vulnerability ever discovered in ASP.NET Core. The flaw, identified as CVE-2...
ConnectWise has issued a major patch to its Automate platform (version 2025.9) to remediate severe security vulnerabilities that could compromise software upgrades. They were found...