social engineering
Big corporations “hacked” in Defcon social engineering contest
Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …
Chameleon-like fake AV delivered via clever social engineering
A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
Google+ related scams move to Facebook
Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …
Security threats: Unwrapping 2011
2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …
First social engineering protection appliance
Highly targeted social engineering attacks have become the new vector of choice for adaptive persistent adversaries as an undetected entry point to enterprise networks, with …
Romanian president declared dead by e-mail scam
BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …
Cybercrime statistics show widespread phishing problem
The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …
Fake AV spreading via Yahoo! Answers
From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …
Facebook scammers go back to using Javascript
Facebook scammers know that in order to keep users falling for their scams, they have to use a variety of approaches. For example, there was a time where rogue applications …
Social media threats and targeted attacks
In the video below, Alexandru Catalin Cosoi, the Head of Online Threats Lab at BitDefender, talks about the new breed of social media threats and sophisticated targeted …
HBGary e-mails are a treasure trove for social engineers
The recent publication of the second batch of corporate e-mails exchanged between HBGary and HBGary Federal executives and various contacts in US intelligence, military and …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance