Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New WIN-DDOS flaws allow attackers to turn public domain controllers into DDOS botnets via RPC, LDAP

Stanford is sticking to legacy admission

Researcher Details Window EPM Addiction Exploit Chain Domain Privileges

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Impersonators are targeting companies with fake TechCrunch outreach
Startups

Impersonators are targeting companies with fake TechCrunch outreach

userBy userAugust 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Hello, thank you for reading TechCrunch. We want to talk to you about the important things right away.

They discovered that scammers were reaching out to businesses by impersonating TechCrunch reporters and event leads. These bad actors are trying to use our names and reputations to trick unsuspecting businesses. It will indulge us and piss us off on your behalf.

Anecdotesly, this isn’t happening on us alone. Scammers are misusing the trust that comes with established news brands to step into the door with businesses across the media industry.

Here are some examples of the most common schemes we have been tracking. Impersonate a reporter to extract from unquestionable goals to take responsibility for reporters. In some cases we know, scammers employ real staff identities, create what appears to be a standard media survey of a company’s products, and request referral calls.

A keen recipient may capture a discrepancy with email addresses that do not match the actual employee’s qualifications. However, these schemes evolve quickly. Bad actors continue to improve their tactics, mimic the writing style of reporters, and refer to startup trends, making the pitch more and more convincing. Equally annoying, victims who agree to phone interviews say that scammers are using those exchanges to dig into more unique details. (The PR official told Axios that someone pretended to be a reporter for TechCrunch raised doubts when they shared the scheduling link.)

Why are they doing this? A reasonable guess is that these are groups looking for initial access to networks and other sensitive information.

As for what to do about it, reach out and claim that someone came from TechCrunch and if you have a bit of doubt as to whether they are legal, don’t just listen to their words. We made it easy for you to check.

Start by checking the TechCrunch staff page. This is the easiest way to see if the person contacting you actually work here. If your personal name is not on our roster, you have your answer there.

If someone’s name will appear on the staff page, but the employee’s job description is not square in the requests you are receiving (i.e. TechCrunch’s copy editor is very interested in learning about your business all of a sudden!), then a bad actor may be trying to deny you.

It sounds like a legitimate request, but if you want to be double-checked, feel free to contact us directly. Learn how to reach each of the BIOS writers, editors, sales executives, marketing gurus and event team members.

I know it’s frustrating to have to double check media enquiries, but these groups hope you don’t take that extra step. Being vigilant about verification will not only protect your company. It helps maintain the trust that legitimate journalists are dependent on doing their jobs.

thank you.


Source link

#Aceleradoras #CapitalRiesgo #EcosistemaStartup #Emprendimiento #InnovaciónEmpresarial #Startups
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSam Altman tackles the “lumpy” GPT-5 rollout, regaining his 4o and “chart crime”
Next Article Cyberark and HashiCorp flaws allow remote vault takeover without credentials
user
  • Website

Related Posts

Stanford is sticking to legacy admission

August 10, 2025

After researchers masked prolific SMS scammers, new operations emerged as a result

August 10, 2025

Sam Altman tackles the “lumpy” GPT-5 rollout, regaining his 4o and “chart crime”

August 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New WIN-DDOS flaws allow attackers to turn public domain controllers into DDOS botnets via RPC, LDAP

Stanford is sticking to legacy admission

Researcher Details Window EPM Addiction Exploit Chain Domain Privileges

After researchers masked prolific SMS scammers, new operations emerged as a result

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.