#social-engineering

[ follow ]
#cybersecurity

10 Must-Read Books on Cybersecurity | TechRepublic

Cybersecurity is crucial for curtailing cyberattacks and improving privacy practices.
Books recommended by Franklin Okeke offer insights on cybersecurity and protection.

Miscreants turn to ad tech to measure malware metrics

Cyber criminals are using ad networks to optimize their malware campaigns and increase the likelihood of users falling for their social engineering attacks.
The DarkGate PDF malware campaign uses ad tools to deliver malicious URLs to victims, evading detection and collecting analytics on who clicks their links.

Criminals Use Malware to Steal Near Field Communication Data

A new cyberattack targets Android users, stealing NFC data via advanced social engineering and malware, enabling unauthorized ATM cash withdrawals.

Protecting financial institutions in the era of AI-driven threats

AI is enhancing the sophistication of ransomware attacks, especially in the financial sector.
Spear phishing using AI is increasing vulnerabilities in financial organizations.
The use of deepfakes represents a new level of threat in cyber attacks.

Engineering the human out of cybersecurity

Human error significantly contributes to data breaches, necessitating a shift in cybersecurity frameworks that accommodate human limitations and behavioral psychology.

FBI Warns of North Korean Hackers Targeting U.S. Bitcoin And Crypto ETFs

North Korean hackers are targeting U.S. cryptocurrency ETFs to steal digital assets through advanced social engineering and persistent cyber threats.

10 Must-Read Books on Cybersecurity | TechRepublic

Cybersecurity is crucial for curtailing cyberattacks and improving privacy practices.
Books recommended by Franklin Okeke offer insights on cybersecurity and protection.

Miscreants turn to ad tech to measure malware metrics

Cyber criminals are using ad networks to optimize their malware campaigns and increase the likelihood of users falling for their social engineering attacks.
The DarkGate PDF malware campaign uses ad tools to deliver malicious URLs to victims, evading detection and collecting analytics on who clicks their links.

Criminals Use Malware to Steal Near Field Communication Data

A new cyberattack targets Android users, stealing NFC data via advanced social engineering and malware, enabling unauthorized ATM cash withdrawals.

Protecting financial institutions in the era of AI-driven threats

AI is enhancing the sophistication of ransomware attacks, especially in the financial sector.
Spear phishing using AI is increasing vulnerabilities in financial organizations.
The use of deepfakes represents a new level of threat in cyber attacks.

Engineering the human out of cybersecurity

Human error significantly contributes to data breaches, necessitating a shift in cybersecurity frameworks that accommodate human limitations and behavioral psychology.

FBI Warns of North Korean Hackers Targeting U.S. Bitcoin And Crypto ETFs

North Korean hackers are targeting U.S. cryptocurrency ETFs to steal digital assets through advanced social engineering and persistent cyber threats.
morecybersecurity

Rampant NYC development killing Second Avenue's character - and luxury is squashing food culture

New luxury apartment developments should include affordable restaurants to prevent displacement of local businesses.

Groupthink (Fortune magazine, 1952)

The shift from individualism to group orientation in American society reflects both societal evolution and growing concerns over coercive social structures.
#scattered-spider

Scattered Spider, BlackCat criminals claw back

Criminal gangs Scattered Spider and BlackCat/ALPHV have reemerged, indicating persistent cyber threats despite law enforcement actions.

Potent youth cybercrime ring made up of 1,000 people, FBI official says

A group of around 1,000 young cybercriminals known as Scattered Spider pose a significant cybersecurity threat through social engineering and collaboration with ransomware groups.

Scattered Spider, BlackCat criminals claw back

Criminal gangs Scattered Spider and BlackCat/ALPHV have reemerged, indicating persistent cyber threats despite law enforcement actions.

Potent youth cybercrime ring made up of 1,000 people, FBI official says

A group of around 1,000 young cybercriminals known as Scattered Spider pose a significant cybersecurity threat through social engineering and collaboration with ransomware groups.
morescattered-spider
#ai-in-cybersecurity

AI in cyber attacks: a potential wildfire?

AI is increasingly being utilized by cybercriminals to enhance the efficacy and frequency of attacks.

AI isn't the cure for AI-led cyber attacks

AI can enhance cyber attacks, increasing frequency and scale. Social engineering remains the leading cause of breaches.

AI in cyber attacks: a potential wildfire?

AI is increasingly being utilized by cybercriminals to enhance the efficacy and frequency of attacks.

AI isn't the cure for AI-led cyber attacks

AI can enhance cyber attacks, increasing frequency and scale. Social engineering remains the leading cause of breaches.
moreai-in-cybersecurity

Malcolm Gladwell's New Take on Tipping Points

Malcolm Gladwell's recent work examines the darker aspects of the Tipping Point concept, focusing on the manipulation of social phenomena.
#cyber-security

Using artificial intelligence (AI) to track and analyze cyber risks

AI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.

The NCSC and FBI just issued a major alert over a state-backed hacker group - here's what you need to know

Iran-linked hackers are using social engineering tactics to target officials related to Iranian and Middle Eastern affairs.

Using artificial intelligence (AI) to track and analyze cyber risks

AI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.

The NCSC and FBI just issued a major alert over a state-backed hacker group - here's what you need to know

Iran-linked hackers are using social engineering tactics to target officials related to Iranian and Middle Eastern affairs.
morecyber-security

Hacker tricks ChatGPT into giving out detailed instructions for making homemade bombs | TechCrunch

ChatGPT's safety guidelines can be circumvented, posing risks for creating dangerous instructions through manipulative prompts.
#candace-owens

Trump superfan Candace Owens says TikTok is 'socially engineering' men to be gay

Candace Owens claims TikTok is manipulating social behaviors, particularly regarding gender and family planning, which she views as unnatural changes against evolution.

Candace Owens says TikTok is socially engineering men to be gay - LGBTQ Nation

Candace Owens condemns TikTok for social engineering American behavior while paradoxically consuming its content.

Trump superfan Candace Owens says TikTok is 'socially engineering' men to be gay

Candace Owens claims TikTok is manipulating social behaviors, particularly regarding gender and family planning, which she views as unnatural changes against evolution.

Candace Owens says TikTok is socially engineering men to be gay - LGBTQ Nation

Candace Owens condemns TikTok for social engineering American behavior while paradoxically consuming its content.
morecandace-owens
#disinformation

How AI Creates and Spreads Disinformation and What Businesses Can Do About It | HackerNoon

Organizations must understand AI capabilities, potential misuse, and strategies to mitigate harm in combating the rise of disinformation.

Hacker Breaches Activision Slack, Steals Call of Duty Info

Image: Rich Polk/Stringer Hacking.Disinformation.Surveillance.CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.A hacker managed to break into a Slack channel of gaming publishing giant Activision, post offensive messages from the targeted account, and steal information related to upcoming Call of Duty releases, according to screenshots posted online by cybersecurity collective VX-Underground.

How AI Creates and Spreads Disinformation and What Businesses Can Do About It | HackerNoon

Organizations must understand AI capabilities, potential misuse, and strategies to mitigate harm in combating the rise of disinformation.

Hacker Breaches Activision Slack, Steals Call of Duty Info

Image: Rich Polk/Stringer Hacking.Disinformation.Surveillance.CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.A hacker managed to break into a Slack channel of gaming publishing giant Activision, post offensive messages from the targeted account, and steal information related to upcoming Call of Duty releases, according to screenshots posted online by cybersecurity collective VX-Underground.
moredisinformation

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Threat actors exploit excitement of Paris Olympics, targeting online users for financial gain.
#microsoft

Crims abusing Microsoft Quick Assist to deploy ransomware

A cybercrime gang is exploiting Microsoft's Quick Assist for social engineering attacks leading to Black Basta ransomware infections.

Hackers are targeting Windows Quick Assist remote desktop features to deploy ransomware

Hackers are targeting Windows Quick Assist for ransomware attacks.

Crims abusing Microsoft Quick Assist to deploy ransomware

A cybercrime gang is exploiting Microsoft's Quick Assist for social engineering attacks leading to Black Basta ransomware infections.

Hackers are targeting Windows Quick Assist remote desktop features to deploy ransomware

Hackers are targeting Windows Quick Assist for ransomware attacks.
moremicrosoft

"Social engineering" hacks work on chatbots, too

Over 2,200 hackers participated in a challenge testing the security of AI models.
Approximately 15.5% of conversations successfully manipulated AI models to break rules or share sensitive data.

Why plugging leaks sometimes means protecting leakers

Cybersecurity breaches are prevalent due to social engineering, targeting individuals with valuable information.
The need for amnesty laws to encourage self-reporting of cyber/counterintelligence intrusions among military and government personnel.
#cybercrime

Crypto scams more costly to US than ransomware, feds say

Investment fraud led to the largest financial loss in cybercrimes last year at $4.57 billion, mostly targeting victims seeking quick returns through cryptocurrency.
Scammers utilize social engineering tactics like romance or confidence scams to transition into crypto investment fraud, along with appealing scams claiming to recover lost funds.

Woman gets SOS from 'nephew' in Canada, loses Rs 1.4 lakh to AI voice fraud | Hyderabad News - Times of India

Artificial intelligence (AI) voice fraud is increasingly targeting people with family in Canada and Israel.
Fraudsters are using AI voice imitating tools to mimic the voices of targeted individuals.
Creating a sense of urgency and claiming to have a relative in a troubled country adds to the effectiveness of the fraud.

Crypto scams more costly to US than ransomware, feds say

Investment fraud led to the largest financial loss in cybercrimes last year at $4.57 billion, mostly targeting victims seeking quick returns through cryptocurrency.
Scammers utilize social engineering tactics like romance or confidence scams to transition into crypto investment fraud, along with appealing scams claiming to recover lost funds.

Woman gets SOS from 'nephew' in Canada, loses Rs 1.4 lakh to AI voice fraud | Hyderabad News - Times of India

Artificial intelligence (AI) voice fraud is increasingly targeting people with family in Canada and Israel.
Fraudsters are using AI voice imitating tools to mimic the voices of targeted individuals.
Creating a sense of urgency and claiming to have a relative in a troubled country adds to the effectiveness of the fraud.
morecybercrime

Poem of the week: Blood by Holly Pester

Pester treats the making of the self and its experiences into poetry as dramatisation.
The poems in the collection combine critique with artistry and humor.

Alice Mason, Real Estate Fixer and Hostess to the Elite, Dies at 100

Alice Mason, a real estate broker and hostess, passed away at the age of 100.
She was known for her talent at social engineering and reshaping the demographics of Manhattan's exclusive co-ops.

How Smart Should Robots Be?

The real source of social engineering can be found in our devices and soon, social robots.
The question of how smart we want our robots to be arises, as social robots aim to replace human interaction.

5 cybersecurity predictions for 2024

Cybersecurity costs are predicted to rise globally to $10.5 trillion by 2025 as cybercrime becomes more sophisticated.
AI-powered scams and advanced phishing techniques are expected to increase in 2024.

Fake Browser Updates Targeting Mac Systems With Infostealer

A social engineering campaign that previously targeted Windows systems is now spreading to macOS.
The campaign uses fake browser updates to distribute the Atomic Stealer malware.
This is the first time experts have observed a social engineering scam targeting both Windows and macOS systems.
#cybercriminals

Passkeys Unlock a New Era for Authentication

Few things evoke a level of disdain on par with computer passwords.They are inconvenient and incredibly insecure.Cybergangs attack them, hack them, and constantly wreak havoc with them.According to industry statistics, upwards of 80% of all breaches involve passwords in one form or another.Even more advanced multifactor authentication (MFA), whether in the form of text codes or rolling numbers on an authentication app, does not address the underlying problem.

Cybersecurity Experts Warn Twitter Breach Will Have Lasting Ramifications - Social Media Explorer

A hacker forum posted the account information of around 200 million Twitter users for no cost.getty After a ransomware infection, the United States Conference of Mayors unanimously voted to stop paying ransoms to hackers in July 2019.Cybersecurity experts heralded the decision, and numerous companies have also taken a stance that a ransom should never be paid - as doing so will only likely result in future attacks from bad actors.

Google AdWords scam epidemic shows social engineering is evolving

Check out all the on-demand sessions from the Intelligent Security Summit here.Social engineering scams are everywhere.Every day, cybercriminals are using whatever medium they can to trick users into handing over their data.This not only includes email, SMS and messaging services, but also online advertising services.

Passkeys Unlock a New Era for Authentication

Few things evoke a level of disdain on par with computer passwords.They are inconvenient and incredibly insecure.Cybergangs attack them, hack them, and constantly wreak havoc with them.According to industry statistics, upwards of 80% of all breaches involve passwords in one form or another.Even more advanced multifactor authentication (MFA), whether in the form of text codes or rolling numbers on an authentication app, does not address the underlying problem.

Cybersecurity Experts Warn Twitter Breach Will Have Lasting Ramifications - Social Media Explorer

A hacker forum posted the account information of around 200 million Twitter users for no cost.getty After a ransomware infection, the United States Conference of Mayors unanimously voted to stop paying ransoms to hackers in July 2019.Cybersecurity experts heralded the decision, and numerous companies have also taken a stance that a ransom should never be paid - as doing so will only likely result in future attacks from bad actors.

Google AdWords scam epidemic shows social engineering is evolving

Check out all the on-demand sessions from the Intelligent Security Summit here.Social engineering scams are everywhere.Every day, cybercriminals are using whatever medium they can to trick users into handing over their data.This not only includes email, SMS and messaging services, but also online advertising services.
morecybercriminals

NatWest introduces limits on crypto trading to prevent fraud | Computer Weekly

Retail bank NatWest is to implement daily and monthly limits on the amount of money customers may pay into cryptocurrency exchanges in an attempt to protect them from fraud and scams, and prevent them from losing "life-changing" sums of money.Going forward, customers will only be able to transfer up to £1,000 daily, and up to £5,000 every 30 days.

NCSC warns over AI language models but rejects cyber alarmism | Computer Weekly

The UK's National Cyber Security Centre (NCSC) has issued advice and guidance for users of AI tools such as ChatGPT that rely on large language model (LLM) algorithms, saying that while they present some data privacy risks, they are not necessarily that useful currently when it comes to deploying them in the service of cyber criminal activity.

Nine in 10 enterprises fell victim to successful phishing in 2022 | Computer Weekly

Email security company Egress finds that 92% of organisations have fallen victim to a successful phishing attack in their Microsoft 365 environments over the past year, with a further 98% of cyber security managers expressing frustration with secure email gateway (SEG) technologies.According to Egress' Email security risks report 2023 - which investigated both inbound phishing attacks and outbound data loss and exfiltration - 58% of cyber security managers said traditional SEG technologies were not effective in stopping employees from accidentally emailing the wrong person or with the wrong attachment, while 53% conceded that too many phishing attacks bypass their gateway.

Stolen League of Legends source code being ransomed, and Riot Games won't pay

Riot Games has confirmed that an attack on its development environment last week included the theft of source code for its League of Legends and Teamfight Tactics games, along with a "legacy anticheat platform."The company has received a ransom demand but states that it will not pay.The release of source code by the attackers, whether publicly or by sale, could have implications for cheat software, providing direct knowledge of the game's mechanisms rather than relying on reverse engineering.
[ Load more ]