Influencers, Phishers Target Tesla, Red Bull Jobs

The article highlights a recent surge in phishing campaigns targeting job seekers applying to high-profile companies like Tesla and Red Bull. Cybercriminals are exploiting the popularity of these brands by creating fake job listings and influencer profiles to lure victims into divulging personal information or downloading malware. These sophisticated scams often involve impersonation of company recruiters or well-known influencers to gain trust. The piece emphasizes the importance of vigilance among job seekers and companies alike, recommending thorough verification of job offers and awareness of phishing tactics. It also discusses the broader implications for remote workforce security, as attackers increasingly leverage social engineering to exploit the growing trend of remote employment. The article serves as a crucial reminder for organizations to bolster their cybersecurity defenses and educate employees about emerging threats in the recruitment landscape.

This Cyber News was published on www.darkreading.com. Publication date: Wed, 08 Oct 2025 14:05:36 +0000


Cyber News related to Influencers, Phishers Target Tesla, Red Bull Jobs

Tesla 'Recalls' Two Million Cars Autopilot Risk - Elon Musk's Tesla is to 'recall' nearly every vehicle sold in the United States, after two year NHTSA investigation. Elon Musk's Tesla is having to recall nearly all its vehicles it has sold in the United States, after the US transportation safety ...
1 year ago Silicon.co.uk
Beijing fosters foreign influencers to spread its propaganda The Register - China is offering foreign influencers access to its vast market in return for content that sings its praises and helps to spreads Beijing's desired narratives more widely around the world, according to think tank the Australian Strategic Policy ...
1 year ago Theregister.com
Tesla Issues Fourth Recall For Cybertruck - Most Cybertrucks in the United States are being recalled over problems with windshield wipers and exterior trim. Elon Musk's Tesla is once again having to issue a recall for thousands of its slab-sided Cybertruck vehicles due to a couple of ...
1 year ago Silicon.co.uk
Influencers, Phishers Target Tesla, Red Bull Jobs - The article highlights a recent surge in phishing campaigns targeting job seekers applying to high-profile companies like Tesla and Red Bull. Cybercriminals are exploiting the popularity of these brands by creating fake job listings and influencer ...
2 hours ago Darkreading.com
Tesla Expands Market Share Lead In Norway - Tesla expands top Norwary market share to 20 percent of new cars, even as it loses position as biggest EV seller worldwide to China's BYD. Tesla has expanded its leading share of Norways' electric vehicle market as the oil-producing country seeks to ...
1 year ago Silicon.co.uk
Kickstart Your DShield Honeypot [Guest Diary] - SANS Internet Storm Center - •    ISC Handlers and Interns: This tool provides a streamlined process for post-installation setup, allowing for faster honeypot deployment and data collection. •    Automated Log Backups: The script ...
1 year ago Isc.sans.edu
Pwn2Own Automotive: $1.3M for 49 zero-days, Tesla hacked twice - The first edition of Pwn2Own Automotive has ended with competitors earning $1,323,750 for hacking Tesla twice and demoing 49 zero-day bugs in multiple electric car systems between January 24 and January 26. Throughout the contest organized by Trend ...
1 year ago Bleepingcomputer.com
Tesla Recalls 27,00 Cybertrucks Over Rear Camera | Silicon UK - CNBC reported that Tesla said on Thursday it would recall more than 27,000 Cybertrucks due to delayed rear-view camera images that could impair driver visibility and increase crash risks. CNBC reported that Tesla said on Thursday that the ...
1 year ago Silicon.co.uk
Social media influencers targeted by identity thieves - Social media influencers are attractive targets for identity thieves. With large followings and a literal influence on their followers, it's no wonder they are targeted by scammers and spreaders of fake news. Such a person influences the financial ...
1 year ago Malwarebytes.com
One Phish, Two Phish, Red Phish, Blue Phish - I sat down for a chat with George Skouroupathis, our phishing expert at Resonance Security. Phishing is often the first step taken by hackers in a larger scam. There are lots of different kinds of phishing attacks, but one of the most prevalent is ...
1 year ago Hackread.com
Attackers Exploit 6-Year-Old Microsoft Office Bug to Spread Spyware - Attackers are exploiting a 6-year-old Microsoft Office remote code execution flaw to deliver spyware, in an email campaign weaponized by malicious Excel attachments and characterized by sophisticated evasion tactics. Threat actors dangle lures ...
1 year ago Darkreading.com CVE-2017-11882 CVE-20170-11882 Equation
Vade Releases 2023 Phishers' Favorites Report - PRESS RELEASE. SAN FRANCISCO, Feb. 15, 2024 /PRNewswire/ - Vade, a global leader in threat detection and response with more than 1.4 billion mailboxes protected, today announced its annual Phishers' Favorites report for 2023. Phishers' Favorites ...
1 year ago Darkreading.com
Red Hat OpenShift Service on AWS obtains FedRAMP "Ready" designation - This means that Red Hat is now listed on the FedRAMP Marketplace as actively pursuing JAB authorization, with additional updates showing our progress and achievements across the two paths for authorization: The existing Agency Authority to Operate ...
1 year ago Redhat.com
Agent Tesla Malware Employs Multi-Stage Attacks Using PowerShell Scripts - Security researchers have identified a sophisticated malware campaign utilizing Agent Tesla variants delivered through elaborate multi-stage attack sequences. Broadcom researchers noted that these Agent Tesla variants employ particularly ...
5 months ago Cybersecuritynews.com
Tesla's Telematics Control Unit Vulnerability Exposes Vehicles to Remote Attacks - Tesla's Telematics Control Unit (TCU) has been found vulnerable to remote cyberattacks, raising significant concerns about vehicle security and driver safety. This vulnerability allows attackers to potentially gain unauthorized access to Tesla ...
1 week ago Cybersecuritynews.com CVE-2024-12345
Hackers Exploiting Old Microsoft Office RCE Flaw - It has been reported that malicious individuals are utilizing a malware called Agent Tesla to target Microsoft Office users using versions affected by CVE-2017-11882 XLAM. This malware is taking advantage of a remote code execution vulnerability in ...
1 year ago Gbhackers.com CVE-2017-11882 Equation
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 year ago Aws.amazon.com
CVE-2023-32156 - Tesla Model 3 Gateway Firmware Signature Validation Bypass Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute ...
1 year ago
DOGE to Fired CISA Staff: Email Us Your Personal Data – Krebs on Security - On Monday, The New York Times reported that U.S. Secret Service agents at the White House were briefly on alert last month when a trusted captain of Elon Musk’s “Department of Government Efficiency” (DOGE) visited the roof of the ...
6 months ago Krebsonsecurity.com
Hackers use six-year old Microsoft Office bug to spread Agent Tesla - Threat actors have been observed leveraging a six-year old bug - CVE-2017-11882 - to spread Agent Tesla to vulnerable versions of Microsoft Office. In a December 19 blog post, Zscaler researchers said CVE-2017-11882 is a remote code execution flaw ...
1 year ago Packetstormsecurity.com CVE-2017-11882 Equation
Tesla AI Robot Attacks raises concerns over Cybersecurity - Over the recent Christmas weekend, a thought-provoking discussion emerged among tech enthusiasts on Reddit, sparking concerns about the Tesla AI Robots designed for manufacturing. The conversation, initially initiated in November, gained momentum ...
1 year ago Cybersecurity-insiders.com
The many ways electric cars are vulnerable to hacks, and whether that matters in a real-world - While I don't own a Tesla, I am now more invested in following the various ways attackers can take advantage of the connectivity of electric cars. They're all Wi-Fi connected so drivers can control the charging speed and timing of their cars, monitor ...
1 year ago Blog.talosintelligence.com Volt Typhoon
CVE-2025-24897 - Misskey is an open source, federated social media platform. Starting in version 12.109.0 and prior to version 2025.2.0-alpha.0, due to a lack of CSRF protection and the lack of proper security attributes in the authentication cookies of Bull's ...
7 months ago Tenable.com
Why Red Teams Can't Answer Defenders' Most Important Questions - Red teaming is useful for plenty of other things, but it's the wrong protocol for answering this specific question about defense efficacy. By their nature, they only test a few specific variants of a few possible attack techniques that an adversary ...
1 year ago Darkreading.com

Cyber Trends (last 7 days)