Advertisement
Top

Tag: social engineering


Data loss, Threats & Malware

Paramount and CBS owner confirms significant breach affecting data of thousands of users

December 27, 2023

Via: TechRadar

Cinema and media powerhouse National Amusements has confirmed suffering a breach in which hackers stole sensitive information from thousands of users, putting them at risk of identity theft. The conglomerate has filed a report with the Office of the Maine […]


Cyber-crime, Malware

The Impact of AI on Social Engineering Cyber Attacks

November 8, 2023

Via: SecureWorld

Social engineering attacks have long been a threat to businesses worldwide, statistically comprising roughly 98% of cyberattacks worldwide. The average business faces more than 700 of these types of attacks every single year. Whether manifesting itself in a sophisticated phishing […]


Cyber-crime, Malware

Kimsuky Targets Think Tanks and News Media with Social Engineering Attacks

June 8, 2023

Via: The Hacker News

The North Korean nation-state threat actor known as Kimsuky has been linked to a social engineering campaign targeting experts in North Korean affairs with the goal of stealing Google credentials and delivering reconnaissance malware. “Further, Kimsuky’s objective extends to the […]


Editorial

Hackers Are Using AI and Machine Learning to Make Their Attacks More Sophisticated

May 4, 2023

Via: Natalie Dunn

Artificial intelligence (AI) is rapidly transforming, bringing many benefits to our daily lives, from personalized recommendations to self-driving cars. At the same time, hackers also leverage AI to make their attacks more sophisticated and challenging to detect. In recent years, […]


Editorial

Social Engineering—From the Trojan Horse to Friendly Emails: Exploiting the Most Common Human Characteristics

August 31, 2022

Via: Natalie Dunn

Organizations view information as a strategic resource, and the importance of integrating applications and IT systems are becoming increasingly important. So, in recent years—as a result of accelerated digitization—the list of risks and types of cyberattacks has grown. Furthermore, emails […]


Cyber-crime, Phishing

How deepfakes enhance social engineering and authentication threats, and what to do about it

October 25, 2021

Via: CSO Online

Deepfake technology is an escalating cybersecurity threat to organizations. Cybercriminals are investing in AI and machine learning to create synthetic or manipulated digital content (including images, video, audio and text) for use in cyberattacks and fraud. This content can realistically […]


Cyber-crime, Phishing

When a scammer calls: 3 strategies to protect customers from call spoofing

September 9, 2021

Via: Help Net Security

One of the first internet memes was born when The New Yorker published the now iconic cartoon captioned, “On the internet, no one knows you’re a dog.” Today we might update that to: “On the phone, no one knows you’re […]


Cyber-crime, Email security, Phishing, Security

Increase in credential phishing and brute force attacks causing financial and reputational damage

August 31, 2021

Via: Help Net Security

Abnormal Security released a report which examines the escalating adverse impact of socially-engineered and never-seen-before email attacks, and other advanced email threats—both financial and reputational—to organizations worldwide. The report surveyed advanced email attacks across eight major industry sectors, including retail […]


Network security, Security

When ‘Later’ Never Comes: Putting Small Business Cybersecurity First

July 16, 2021

Via: Security Intelligence

Small- and medium-sized businesses can be victims of digital attacks as much as global ones can. In fact, 88% of small business owners think they’re open to a cyberattack. In response, startups must allocate time and resources to getting the […]


Cyber-crime, Phishing

Fake Amazon order emails lead to vishing

May 21, 2021

Via: Help Net Security

Fraudsters are sending out fake Amazon order emails and tricking online shoppers into calling a telephone number manned by them to steal the shoppers’ credit card details and other sensitive information. The fake Amazon order emails Armorblox has recently spotted […]


Cyber-crime, Phishing

What are phishing kits? Web components of phishing attacks explained

April 1, 2021

Via: CSO Online

Phishing is a social attack, directly related to social engineering. Commonly centered around email, criminals use phishing to obtain access or information. Phishing attacks can be basic or customized toward the victim and their organization. A phishing attack with a […]


Cyber-crime, Identity theft

Half of Americans Experienced Identity Theft During COVID-19 Pandemic, New Study Shows

March 16, 2021

Via: Hot for Security

A new report uncovers a striking pervasiveness of identity theft perpetrated against U.S. consumers where half of respondents surveyed experienced such an occurrence during the pandemic. Developed by Aite Group and underwritten by GIACT, the study found that 47% of […]


Cyber-crime, Phishing

Recent Spear-Phishing Attacks Originate From Legit Accounts

December 16, 2020

Via: DataBreach Today

A spear-phishing campaign detected earlier this month that uses messages that appear to originate with legitimate companies is targeting enterprise users in an effort to steal Microsoft Office 365 credentials, according to a report from Abnormal Security. In the campaign […]


Cloud security, Cyber-crime, Phishing, Security

Rackspace Hosted Email Flaw Actively Exploited by Attackers

November 5, 2020

Via: DataBreach Today

Attackers have been actively exploiting a flaw in Rackspace’s hosted email service to send phishing emails, bearing legitimate and validated domain names, as part of business email compromise scams. So warns 7 Elements, an IT security testing consultancy based in […]


Cyber-crime, Phishing

Money is still the root of most breaches

May 19, 2020

Via: Help Net Security

Verizon has released its annual Data Breach Investigations Report (DBIR), which offers an overview of the cyber security incidents and data breaches that happened in/were discovered in the past year. Based on an analysis of incident and breach reports by […]


Application security, Cyber-crime, Malware, Security, Vulnerabilities

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

March 16, 2020

Via: Security Intelligence

The video gaming landscape has changed drastically over the past few decades. Some of these changes have led to considerable developments in the cyberthreat landscape as it applies to gaming companies, the games themselves and the user base that enjoys […]


Email security, Phishing, Security

Cybercriminals are becoming more methodical and adaptive

April 26, 2019

Via: Help Net Security

Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as time to detection and response to threats, according to Trustwave. The 2019 Trustwave […]


Application security, Mobile security, Vulnerabilities

Five new threats to your mobile device security

August 1, 2017

Via: CSO Online

A decade ago, mobile malware was considered a new and unlikely threat. Many mobile device users even considered themselves immune from such threats.  Fast forward to 2017, and more than 1.5 million new incidents of mobile malware have been detected by […]


Phishing

SMS Phishing induces victims to photograph its own token card

July 17, 2017

Via: Security Affairs

Today I faced quite an unusual SMS phishing campaign here in Brazil. A friend of mine received an SMS message supposedly sent from his bank asking him to update his registration data through the given URL. Otherwise, he could have […]


Phishing

11 tips to prevent phishing

July 10, 2017

Via: CSO Online

Most of us have clicked on an email that seemed legitimate, but wasn’t. Here are our top phishing prevention tips for best technology practices, employee education and social media smarts. 3 ways to stop 95-99 percent of spear-phishing attempts 1. […]