Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Ten Cyber Security Tips for 2022
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Ten Cyber Security Tips for 2022
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cyber Security /
The Spine Collector: Man arrested for using fake email addresses to steal hundreds of unpublished manuscripts

The Spine Collector: Man arrested for using fake email addresses to steal hundreds of unpublished manuscripts

Jan 7, 2022 06:00 pm Cyber Security 46
For years, "The Spine Collector" has been haunting publishers around the world, attempting to steal manuscripts by famous authors.

Read more in my article on the Hot for Security blog.

Support the originator by clicking the read the rest link below.
spine collector arrested using email addresses steal hundreds unpublished manuscripts
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
bitdefender.com
AvosLocker Actors Seek Apology by Releasing Free Decryptor
Prev
AvosLocker Actors Seek Apology by Releasing...
5 Things New with Bug Bounty Programs
Next
5 Things New with Bug Bounty Programs

Related News

  • Jail for man who hacked the email of female students, stole and traded their private photos
    Jail for man who hacked the email of female...
  • Ransomware Hackers Steal Personal Data of 500,000 Students and Staff in Chicago
    Ransomware Hackers Steal Personal Data of...
  • Beware of Fake Windows 11 Downloads Distributing Vidar Malware
    Beware of Fake Windows 11 Downloads...
  • Fake domains offer Windows 11 installers - but deliver malware instead
    Fake domains offer Windows 11 installers - but...
  • Fake news – why do people believe it?
    Fake news – why do people believe it?
  • Axie Infinity's Discord bot compromised, hackers issue fake minting message
    Axie Infinity's Discord bot compromised,...
  • FBI Warns of Hackers Using Malicious PHP Code to Steal Credit Card Data
    FBI Warns of Hackers Using Malicious PHP Code...
  • Secure Email Gateway Vs. Integrated Cloud Email Security (SEG Vs. ICES) – What’s the difference, and which should my business use?
    Secure Email Gateway Vs. Integrated Cloud Email...
  • This phishing attack delivers three forms of malware. And they all want to steal your data
    This phishing attack delivers three forms of...
  • Fake Pixelmon NFT Site Infects Users with Password-stealing Vidar Malware
    Fake Pixelmon NFT Site Infects Users with...
1 How to develop competency in cyber threat intelligence capabilities
How to develop competency in cyber threat intelligence capabilities
Coinbase offers 'thousands of tokens' in expanded swap service
2 Coinbase offers 'thousands of tokens' in expanded swap...
Japan exchange Coincheck lists SAND, the crypto asset of The Sandbox metaverse
3 Japan exchange Coincheck lists SAND, the crypto asset of...
PIXM Mobile provides real-time protection from phishing attacks on mobile devices - Help Net Security
4 PIXM Mobile provides real-time protection from phishing...
BlackBerry partners with NXP Semiconductors to help companies prepare for post-quantum cyber attacks - Help Net Security
5 BlackBerry partners with NXP Semiconductors to help...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!