#social-engineering

[ follow ]
#cybersecurity

10 Must-Read Books on Cybersecurity | TechRepublic

Cybersecurity is crucial for curtailing cyberattacks and improving privacy practices.
Books recommended by Franklin Okeke offer insights on cybersecurity and protection.

Miscreants turn to ad tech to measure malware metrics

Cyber criminals are using ad networks to optimize their malware campaigns and increase the likelihood of users falling for their social engineering attacks.
The DarkGate PDF malware campaign uses ad tools to deliver malicious URLs to victims, evading detection and collecting analytics on who clicks their links.

Criminals Use Malware to Steal Near Field Communication Data

A new cyberattack targets Android users, stealing NFC data via advanced social engineering and malware, enabling unauthorized ATM cash withdrawals.

Protecting financial institutions in the era of AI-driven threats

AI is enhancing the sophistication of ransomware attacks, especially in the financial sector.
Spear phishing using AI is increasing vulnerabilities in financial organizations.
The use of deepfakes represents a new level of threat in cyber attacks.

Engineering the human out of cybersecurity

Human error significantly contributes to data breaches, necessitating a shift in cybersecurity frameworks that accommodate human limitations and behavioral psychology.

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware

Social engineering tactics via Microsoft Teams are increasingly being used to spread malware and gain unauthorized access.

10 Must-Read Books on Cybersecurity | TechRepublic

Cybersecurity is crucial for curtailing cyberattacks and improving privacy practices.
Books recommended by Franklin Okeke offer insights on cybersecurity and protection.

Miscreants turn to ad tech to measure malware metrics

Cyber criminals are using ad networks to optimize their malware campaigns and increase the likelihood of users falling for their social engineering attacks.
The DarkGate PDF malware campaign uses ad tools to deliver malicious URLs to victims, evading detection and collecting analytics on who clicks their links.

Criminals Use Malware to Steal Near Field Communication Data

A new cyberattack targets Android users, stealing NFC data via advanced social engineering and malware, enabling unauthorized ATM cash withdrawals.

Protecting financial institutions in the era of AI-driven threats

AI is enhancing the sophistication of ransomware attacks, especially in the financial sector.
Spear phishing using AI is increasing vulnerabilities in financial organizations.
The use of deepfakes represents a new level of threat in cyber attacks.

Engineering the human out of cybersecurity

Human error significantly contributes to data breaches, necessitating a shift in cybersecurity frameworks that accommodate human limitations and behavioral psychology.

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware

Social engineering tactics via Microsoft Teams are increasingly being used to spread malware and gain unauthorized access.
morecybersecurity

Get ready for these scams in 2025

Scammers are becoming more sophisticated, utilizing personal data and technology to execute highly convincing fraud schemes.
#malware

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

Malicious Android apps posing as loan services have been found on Google Play, collectively downloaded over 8 million times, containing SpyLoan malware.

Hackers are targeting Windows Quick Assist remote desktop features to deploy ransomware

Hackers are targeting Windows Quick Assist for ransomware attacks.

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

Malicious Android apps posing as loan services have been found on Google Play, collectively downloaded over 8 million times, containing SpyLoan malware.

Hackers are targeting Windows Quick Assist remote desktop features to deploy ransomware

Hackers are targeting Windows Quick Assist for ransomware attacks.
moremalware

Rampant NYC development killing Second Avenue's character - and luxury is squashing food culture

New luxury apartment developments should include affordable restaurants to prevent displacement of local businesses.

Groupthink (Fortune magazine, 1952)

The shift from individualism to group orientation in American society reflects both societal evolution and growing concerns over coercive social structures.
#scattered-spider

Scattered Spider, BlackCat criminals claw back

Criminal gangs Scattered Spider and BlackCat/ALPHV have reemerged, indicating persistent cyber threats despite law enforcement actions.

Potent youth cybercrime ring made up of 1,000 people, FBI official says

A group of around 1,000 young cybercriminals known as Scattered Spider pose a significant cybersecurity threat through social engineering and collaboration with ransomware groups.

Scattered Spider, BlackCat criminals claw back

Criminal gangs Scattered Spider and BlackCat/ALPHV have reemerged, indicating persistent cyber threats despite law enforcement actions.

Potent youth cybercrime ring made up of 1,000 people, FBI official says

A group of around 1,000 young cybercriminals known as Scattered Spider pose a significant cybersecurity threat through social engineering and collaboration with ransomware groups.
morescattered-spider
#ai-in-cybersecurity

AI in cyber attacks: a potential wildfire?

AI is increasingly being utilized by cybercriminals to enhance the efficacy and frequency of attacks.

AI isn't the cure for AI-led cyber attacks

AI can enhance cyber attacks, increasing frequency and scale. Social engineering remains the leading cause of breaches.

AI in cyber attacks: a potential wildfire?

AI is increasingly being utilized by cybercriminals to enhance the efficacy and frequency of attacks.

AI isn't the cure for AI-led cyber attacks

AI can enhance cyber attacks, increasing frequency and scale. Social engineering remains the leading cause of breaches.
moreai-in-cybersecurity

Malcolm Gladwell's New Take on Tipping Points

Malcolm Gladwell's recent work examines the darker aspects of the Tipping Point concept, focusing on the manipulation of social phenomena.
#cyber-security

Using artificial intelligence (AI) to track and analyze cyber risks

AI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.

The NCSC and FBI just issued a major alert over a state-backed hacker group - here's what you need to know

Iran-linked hackers are using social engineering tactics to target officials related to Iranian and Middle Eastern affairs.

Using artificial intelligence (AI) to track and analyze cyber risks

AI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.

The NCSC and FBI just issued a major alert over a state-backed hacker group - here's what you need to know

Iran-linked hackers are using social engineering tactics to target officials related to Iranian and Middle Eastern affairs.
morecyber-security

Hacker tricks ChatGPT into giving out detailed instructions for making homemade bombs | TechCrunch

ChatGPT's safety guidelines can be circumvented, posing risks for creating dangerous instructions through manipulative prompts.
#candace-owens

Trump superfan Candace Owens says TikTok is 'socially engineering' men to be gay

Candace Owens claims TikTok is manipulating social behaviors, particularly regarding gender and family planning, which she views as unnatural changes against evolution.

Candace Owens says TikTok is socially engineering men to be gay - LGBTQ Nation

Candace Owens condemns TikTok for social engineering American behavior while paradoxically consuming its content.

Trump superfan Candace Owens says TikTok is 'socially engineering' men to be gay

Candace Owens claims TikTok is manipulating social behaviors, particularly regarding gender and family planning, which she views as unnatural changes against evolution.

Candace Owens says TikTok is socially engineering men to be gay - LGBTQ Nation

Candace Owens condemns TikTok for social engineering American behavior while paradoxically consuming its content.
morecandace-owens

How AI Creates and Spreads Disinformation and What Businesses Can Do About It | HackerNoon

Organizations must understand AI capabilities, potential misuse, and strategies to mitigate harm in combating the rise of disinformation.

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Threat actors exploit excitement of Paris Olympics, targeting online users for financial gain.
#cybercrime

Crypto scams more costly to US than ransomware, feds say

Investment fraud led to the largest financial loss in cybercrimes last year at $4.57 billion, mostly targeting victims seeking quick returns through cryptocurrency.
Scammers utilize social engineering tactics like romance or confidence scams to transition into crypto investment fraud, along with appealing scams claiming to recover lost funds.

Crims abusing Microsoft Quick Assist to deploy ransomware

A cybercrime gang is exploiting Microsoft's Quick Assist for social engineering attacks leading to Black Basta ransomware infections.

Crypto scams more costly to US than ransomware, feds say

Investment fraud led to the largest financial loss in cybercrimes last year at $4.57 billion, mostly targeting victims seeking quick returns through cryptocurrency.
Scammers utilize social engineering tactics like romance or confidence scams to transition into crypto investment fraud, along with appealing scams claiming to recover lost funds.

Crims abusing Microsoft Quick Assist to deploy ransomware

A cybercrime gang is exploiting Microsoft's Quick Assist for social engineering attacks leading to Black Basta ransomware infections.
morecybercrime

"Social engineering" hacks work on chatbots, too

Over 2,200 hackers participated in a challenge testing the security of AI models.
Approximately 15.5% of conversations successfully manipulated AI models to break rules or share sensitive data.

Why plugging leaks sometimes means protecting leakers

Cybersecurity breaches are prevalent due to social engineering, targeting individuals with valuable information.
The need for amnesty laws to encourage self-reporting of cyber/counterintelligence intrusions among military and government personnel.

Poem of the week: Blood by Holly Pester

Pester treats the making of the self and its experiences into poetry as dramatisation.
The poems in the collection combine critique with artistry and humor.

Alice Mason, Real Estate Fixer and Hostess to the Elite, Dies at 100

Alice Mason, a real estate broker and hostess, passed away at the age of 100.
She was known for her talent at social engineering and reshaping the demographics of Manhattan's exclusive co-ops.

How Smart Should Robots Be?

The real source of social engineering can be found in our devices and soon, social robots.
The question of how smart we want our robots to be arises, as social robots aim to replace human interaction.

5 cybersecurity predictions for 2024

Cybersecurity costs are predicted to rise globally to $10.5 trillion by 2025 as cybercrime becomes more sophisticated.
AI-powered scams and advanced phishing techniques are expected to increase in 2024.
[ Load more ]