social engineering
Cyber espionage group uses low profile tools to hunt high profile targets
Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and …
Tactical exploitation with Warberry Pi
WarBerry Pi was built for red team engagements where it’s essential to obtain as much information as possible in a short period of time, while going undetected. All you need …
The life of a social engineer: Hacking the human
A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and …
Cybercriminals increasingly exploiting human nature
Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …
Know your enemy: The most popular hacking methods
Outsiders want to become insiders with the least possible effort, and insiders help them do so – mostly accidentally, according to Balabit. 54% of the survey respondents …
Belgian bank Crelan loses €70 million to BEC scammers
Belgian bank Crelan has become a victim of fraudsters. According to a statement (in Dutch) published last week, the bank has lost over 70 million euros (around $75,8 million). …
Google debuts customized warning for social engineering sites
Google Chrome users will from now on be faced with a new, customized warning every time they visit a website/page that contains social engineering content:“The threat …
Fake recruiters on LinkedIn are targeting infosec pros
“There’s a group of fake recruiters on LinkedIn mapping infosec people’s networks. Not sure what their goal is yet, just a heads-up to others,” …
Fraudsters steal nearly $47 million from Ubiquiti Networks
US networking technology company Ubiquiti Networks has been swindled by fraudsters and has lost nearly $47 million.According to the quarterly financial report the company …
Nigerian scammers are stealing millions from businesses
When someone mentions advanced fee or romance scams most people immediately associate them with Nigerian scammers. But there is another type of scam that these fraudsters …
Which malware lures work best?
“More often than not, malware peddlers’ main goal is to deliver their malicious wares to the maximum number of users possible. Choosing the right lure is crucial …
Banking Trojan delivered to companies via macro-based malware
“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware. But instead …
Featured news
Resources
Don't miss
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks