social engineering
Tax season security tips: Protect yourself from cybercrime
Between December 2016 and February 2017, IBM X-Force researchers saw a 6,000 percent increase in tax-related spam emails. The researchers see this increase and other factors …
UK residents hit with extremely personalized scam emails
A compelling and potentially very successful email spam campaign is being leveraged against UK residents, warns Sophos researcher Paul Ducklin. The email addresses the …
Targeted attack prevention in cloud email and messaging systems
GreatHorn announced the launch of the GreatHorn Threat Platform (GTP) at RSA Conference 2017. The Threat Platform extends the capabilities of the company’s cloud-native …
Picky ransomware targets specific subset of would-be Netflix users
Aspiring Netflix users who don’t want to actually pay for the popular video on demand service are being targeted with a new type of ransomware. Detected as Netix by …
Phishers’ new social engineering trick: PDF attachments with malicious links
It is – or it should be – a well known fact that attackers occasionally email potential victims with PDF attachments containing malware or exploit code. But the …
65% of social engineering attacks compromised employee credentials
Social engineering is having a notable impact on organizations across a range of industrial sectors in the US. In fact, 60 percent of surveyed security leaders say their …
Privileged user abuse and the insider threat
Although insider leaks and attacks continue to multiply, a Ponemon Institute study found that 58 percent of IT operations and security managers believe their organizations are …
New wave of targeted attacks focus on industrial organizations
Kaspersky Lab researchers discovered a new wave of targeted attacks against the industrial and engineering sectors in 30 countries around the world. Dubbed Operation Ghoul, …
Interpol arrests Nigerian scam mastermind who stole $60 million
The head of an international criminal network behind thousands of online frauds has been arrested in a joint operation by INTERPOL and the Nigerian Economic and Financial …
Cyber espionage group uses low profile tools to hunt high profile targets
Kaspersky Lab researchers investigated a threat actor that was undertaking aggressive cyber espionage activity in the Asian region, targeting multiple diplomatic and …
Tactical exploitation with Warberry Pi
WarBerry Pi was built for red team engagements where it’s essential to obtain as much information as possible in a short period of time, while going undetected. All you need …
The life of a social engineer: Hacking the human
A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways