Linkedin
Home
CISO Diaries
LinkedIn
Categories
AI and security
Cyber threats and incidents
Founders, Analysts & Industry Voices
Identity & Access Management Security
About CISO Whisperer
Contact Us
Search
Home
CISO Diaries
LinkedIn
Categories
AI and security
Cyber threats and incidents
Founders, Analysts & Industry Voices
Identity & Access Management Security
About CISO Whisperer
Contact Us
go
Search
Home
CISO Diaries
LinkedIn
Categories
AI and security
Cyber threats and incidents
Founders, Analysts & Industry Voices
Identity & Access Management Security
About CISO Whisperer
Contact Us
go
Search
Tag:
paypal
Cyber threats and incidents
Attackers Abuse LiveChat to Phish Credit Card and Personal Data
What happened Attackers are abusing the LiveChat customer support platform...
Cyber threats and incidents
PayPal Data Breach Exposed Personal Information Through Loan Application Error
What happened PayPal disclosed a data breach caused by a...
Cyber threats and incidents
Apple and PayPal Invoice Emails Abused in Invoice-Themed Phishing Scams
What happened Threat actors are abusing legitimate-looking invoice emails referencing...
Cyber threats and incidents
PayPal Subscription Emails Abused in Fake Purchase Scam
What happened Attackers are abusing PayPal’s subscription feature to send...
Popular
CISO Diaries: David Webb on Resilience, Operational Risk, and Leading Through Disruption
May 14, 2026
0
David Webb’s perspective on cybersecurity has been shaped by...
Defense and Intelligence CISOs to Watch: Securing America’s Most Sensitive Missions
May 14, 2026
0
The organizations in this feature operate at the intersection...
Iranian Hackers Targeted Major South Korean Electronics Maker in Espionage Campaign
May 14, 2026
0
What happened Symantec's Threat Hunter Team has documented a broad...
UK Moves to Shield Security Researchers in Cybercrime Law Overhaul
May 14, 2026
0
What happened The UK government announced on Wednesday that it...
Federal CISOs to Watch: The Leaders Securing America’s Government Agencies
May 13, 2026
0
Federal government cybersecurity operates under a set of constraints...