#social-engineering

[ follow ]
#malware-distribution
Information security
fromTheregister
1 day ago

Crooks compromise WordPress sites, spread infostealers

Attackers compromised legitimate WordPress sites including a US Senate candidate's website to distribute infostealer malware through fake Cloudflare CAPTCHA pages that trick users into running malicious commands.
Information security
fromTechzine Global
1 day ago

Ericsson breach: voice phishing call exposed over 15,000 records

A vishing attack on an Ericsson vendor exposed personal data including Social Security numbers and medical information for 15,661 people after an employee was tricked into revealing account access.
Information security
fromSecurityWeek
1 day ago

Hundreds of Salesforce Customers Allegedly Targeted in New Data Theft Campaign

ShinyHunters targets Salesforce instances through social engineering and misconfiguration exploitation, not platform vulnerabilities, prompting Salesforce warnings about overly permissive guest user settings.
Privacy professionals
fromTheregister
1 day ago

Ericsson breach blamed on third party vendor vishing attack

A voice-phishing attack on an Ericsson service provider exposed personal data of over 15,000 individuals, including names, Social Security numbers, and government-issued IDs.
#phishing-attacks
fromEngadget
2 days ago
Information security

Dutch intelligence services warn of Russian hackers targeting Signal and WhatsApp

fromwww.mediaite.com
2 days ago
Privacy technologies

Secure Messaging App Warns Government Officials and Journalists' Had Accounts Stolen After Falling For Scam

Information security
fromEngadget
2 days ago

Dutch intelligence services warn of Russian hackers targeting Signal and WhatsApp

Russian hackers are conducting large-scale phishing campaigns targeting Signal and WhatsApp accounts of government and military officials by impersonating support chatbots to steal PINs and access messages.
Privacy technologies
fromwww.mediaite.com
2 days ago

Secure Messaging App Warns Government Officials and Journalists' Had Accounts Stolen After Falling For Scam

Signal users including government officials and journalists experienced account takeovers through sophisticated phishing attacks targeting SMS codes and PINs, though Signal's encryption and infrastructure remain uncompromised.
Information security
fromThe Hacker News
2 days ago

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

A malicious npm package impersonating OpenClaw deploys a remote access trojan and steals sensitive data including credentials, crypto wallets, SSH keys, and browser data from infected systems.
Information security
fromThe Hacker News
2 days ago

UNC4899 Used AirDrop File Transfer and Cloud Exploits to Steal Millions From Crypto Firm

North Korean threat actor UNC4899 compromised a cryptocurrency organization's cloud environment through social engineering and DevOps exploitation to steal millions in cryptocurrency.
#russian-cyber-attacks
fromTechCrunch
2 days ago
Privacy technologies

Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn | TechCrunch

Russian state actors are conducting large-scale phishing campaigns targeting Signal and WhatsApp users, particularly government, military officials, and journalists worldwide, using social engineering rather than malware.
fromTheregister
2 days ago
Information security

Russian crims phish way into Signal and WhatsApp accounts

Russian-linked hackers target Signal and WhatsApp accounts by tricking users into sharing security codes rather than breaking encryption, successfully compromising government officials, journalists, and military personnel globally.
Privacy technologies
fromTechCrunch
2 days ago

Russian government hackers targeting Signal and WhatsApp users, Dutch spies warn | TechCrunch

Russian state actors are conducting large-scale phishing campaigns targeting Signal and WhatsApp users, particularly government, military officials, and journalists worldwide, using social engineering rather than malware.
Information security
fromTheregister
2 days ago

Russian crims phish way into Signal and WhatsApp accounts

Russian-linked hackers target Signal and WhatsApp accounts by tricking users into sharing security codes rather than breaking encryption, successfully compromising government officials, journalists, and military personnel globally.
#cryptocurrency-fraud
Cryptocurrency
fromCointelegraph
2 weeks ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering scams build long-term emotional trust before exploiting victims through fake crypto investment platforms, fundamentally differing from quick-strike phishing attacks.
Information security
fromTechzine Global
2 days ago

Mass attack by Russian hackers on Dutch military personnel and civil servants

Russian hackers target Signal and WhatsApp accounts of Dutch government employees and military personnel by impersonating support chatbots to steal verification codes and exploit linked device features for remote account access.
fromPCWorld
5 days ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Information security
fromTheregister
5 days ago

Microsoft spots ClickFix scam spreading Lumma infostealer

A new ClickFix scam variant tricks Windows users into pasting malware commands into Windows Terminal, deploying the Lumma credential-stealing infostealer to compromise browser vaults.
Information security
fromThe Hacker News
5 days ago

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Microsoft discovered a ClickFix campaign using Windows Terminal to deploy Lumma Stealer malware through social engineering and hex-encoded commands.
Information security
fromSecuritymagazine
1 week ago

The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

Hackers exploit DLL side-loading on trusted platforms like LinkedIn to deliver malware through seemingly legitimate file attachments, bypassing traditional security defenses and compromising entire corporate networks.
Information security
fromThe Hacker News
1 week ago

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat actors impersonate IT support via email and phone calls to deliver Havoc C2 framework for data exfiltration or ransomware attacks across multiple organizations.
Information security
fromComputerworld
1 week ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
#phishing
Privacy technologies
fromTechzine Global
1 week ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromwww.theguardian.com
1 month ago
Information security

I'm a tech-savvy zillennial who knows how to safeguard against hacking. Scammers still managed to get me | Caitlin Cassidy

Information security
fromAbove the Law
1 month ago

Law Firm Sent Out Fake Christmas Vouchers. Staff Want To Ram Coal Up Leadership's Chimneys. - Above the Law

Phishing tests that mimic promised internal rewards risk alienating employees and undermining trust; clear verified communication and targeted education strengthen cybersecurity.
Privacy technologies
fromTechzine Global
1 week ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromwww.theguardian.com
1 month ago
Information security

I'm a tech-savvy zillennial who knows how to safeguard against hacking. Scammers still managed to get me | Caitlin Cassidy

fromAbove the Law
1 month ago
Information security

Law Firm Sent Out Fake Christmas Vouchers. Staff Want To Ram Coal Up Leadership's Chimneys. - Above the Law

Information security
fromTheregister
1 week ago

Scattered Lapsus$ Hunters seeks women to defraud helpdesks

Scattered Lapsus$ Hunters recruits women for social engineering attacks against IT helpdesks, offering $500-$1,000 per successful call to exploit gender bias in security training.
fromTechzine Global
1 week ago

Dutch telco refuses to pay ransom, hackers to publish customer data

In the cyberattack reported by Odido two weeks ago, personal data from more than 6 million accounts was stolen. The stolen information includes names, home and email addresses, phone numbers, dates of birth, bank account numbers, and ID numbers.
Privacy technologies
fromThe Hacker News
2 weeks ago

SLH Offers $500-$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

SLH is diversifying its social engineering pool by specifically recruiting women to conduct vishing attacks, likely to increase the success rate of help desk impersonation. The group is said to be offering anywhere between $500 and $1,000 upfront per call, in addition to providing them with the necessary pre-written scripts to carry out the attack.
Information security
Information security
fromCointelegraph
2 weeks ago

How Pig-Butchering Crypto Scams Turn Trust Into a Financial Weapon

Pig-butchering scams build long-term emotional trust to coerce victims into fraudulent crypto investments, extracting funds over time through staged profits and blocked withdrawals.
fromDataBreaches.Net
2 weeks ago

The hospitality sector continues to be lucrative targets - DataBreaches.Net

Choice Hotels International disclosed a breach affecting franchisees and applicants. Its notification letter states that a "skilled person used social engineering" to gain access on January 14, 2026 to an application that contained records regarding franchisees and franchise applicants. The access occurred even though access required multifactor authentication (MFA). The information involved included names and Social Security numbers. There is no indication that any guest data was involved. No gang has publicly claimed responsibility for the attack as yet.
Information security
#data-breach
fromTechCrunch
1 month ago
Information security

Hackers publish personal information stolen during Harvard, UPenn data breaches | TechCrunch

fromTechCrunch
1 month ago
Information security

Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users | TechCrunch

fromTechCrunch
1 month ago
Information security

Hackers publish personal information stolen during Harvard, UPenn data breaches | TechCrunch

fromTechCrunch
1 month ago
Information security

Fintech firm Betterment confirms data breach after hackers send fake crypto scam notification to users | TechCrunch

Information security
fromTechRepublic
3 weeks ago

Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware

Fake CAPTCHA pages trick Windows users into running malicious PowerShell that deploys StealC malware to steal credentials, wallets, and system data.
#clickfix
fromZDNET
4 months ago
Information security

Your phishing detection skills are no match for 2025's biggest security threats

fromZDNET
4 months ago
Information security

Your phishing detection skills are no match for 2025's biggest security threats

fromTechRepublic
3 weeks ago

Viral AI Caricatures Highlight Shadow AI Dangers

"While many have been discussing the privacy risks of people following the ChatGPT caricature trend, the prompt reveals something else alarming - people are talking to their LLMs about work," said Josh Davies, principal market strategist at Fortra, in an email to eSecurityPlanet. He added, "If they are not using a sanctioned ChatGPT instance, they may be inputting sensitive work information into a public LLM. Those who publicly share these images may be putting a target on their back for social engineering attempts, and malicious actors have millions of entries to select attractive targets from."
Information security
Information security
fromTechzine Global
3 weeks ago

Lumma Stealer back despite previous police action

Lumma Stealer infections are increasing, using ClickFix social-engineering and memory-only CastleLoader to deploy credential-stealing malware that exfiltrates passwords, wallets, and system data.
fromFast Company
3 weeks ago

Love, lies, and LLMs: How to protect yourself from AI romance scams

Romance scams used to feel like a cliché. Everyone pictured an email from an overseas "prince" that was poorly written and full of typos and pleas for cash. Now, that cliché is dead. Today's romance scams are industrial-scale operations. Attackers use artificial intelligence to clone voices, create deepfake video calls, and write scripts with large language models (LLMs). In 2024 alone, the Federal Trade Commission reported that financial losses to romance scams skyrocketed, with victims losing $1.14 billion.
Digital life
Information security
fromTheregister
4 weeks ago

Posting AI caricatures on social media is bad for security

Posting AI-generated work caricatures publicly can expose personal and employer information, increasing risk of social engineering, LLM account takeovers, and sensitive data theft.
Information security
fromTheregister
4 weeks ago

Payroll pirates conned the help desk, stole employee's pay

Attackers used compromised shared-mailbox credentials and a help-desk MFA reset via social engineering to divert a physician's salary into the attacker's account.
fromThe Hacker News
4 weeks ago

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated video to deceive the victim," Google Mandiant researchers Ross Inman and Adrian Hernandez said.
Information security
Germany news
fromThe Hacker News
1 month ago

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

State-sponsored actors conduct Signal phishing that tricks targets into revealing SMS PINs or scanning QR codes to hijack accounts and impersonate victims.
Information security
fromTechRepublic
6 months ago

Workday Hit by Social Engineering Attack, Third-Party Data Exposed

A social engineering attack gave attackers access to a third-party CRM, exposing business contact details while Workday's customer tenants and stored data remained uncompromised.
fromTheregister
1 month ago

Betterment breach scope pegged at 1.4M users

Betterment, which offers automated investment and financial planning services, first disclosed the breach in January after detecting unauthorized access to certain internal systems on January 9. Betterment said the hacker gained entry through a social engineering scheme that relied on impersonation to infiltrate third-party marketing and operations tools, then used that access to send customers a fraudulent cryptocurrency promotion disguised as an official company message.
Information security
Information security
fromSecuritymagazine
1 month ago

Healthcare Cybersecurity Is in Crisis - These Proven Controls Could Be the Cure

Healthcare cybersecurity crisis: breaches doubled in 2025, average losses exceeded $2M; prioritize anti-fraud training, regulatory compliance, and targeted investments to reduce material risk.
fromSilicon Canals
1 month ago

The phone call scam targeting grandparents that sounds so real even cautious people fall for it - Silicon Canals

The phone rings at 2:47 AM. Your heart pounds as you fumble for the receiver. "Grandma?" The voice is shaky, desperate. "I'm in trouble. I got arrested. Please don't tell Mom and Dad." The voice sounds just like your grandson. He uses the nickname only family knows. He remembers that trip you took together last summer. Everything about this call feels real because, in many ways, it is.
Information security
fromSilicon Canals
1 month ago

6 phone scams targeting seniors that sound completely legitimate - Silicon Canals

Picture this: Your phone rings. The caller ID shows your local hospital. The voice on the other end sounds professional, maybe a bit urgent. They're calling about Medicare coverage changes that could affect your upcoming procedures. They just need to verify some information to ensure your benefits continue uninterrupted. Sounds legitimate, right? Here's the thing - it probably isn't. And that's exactly what makes modern phone scams so dangerous.
Digital life
fromSilicon Canals
1 month ago

I'm a retired Boomer and I just watched my smartest friend lose everything to a scam-here are 9 ways they got to him that could get to anyone - Silicon Canals

Last month, I sat across from one of the brightest people I know as he explained how he'd lost nearly everything to a sophisticated scam. This wasn't some naive teenager or technophobe. This was my friend from university days, a retired executive who'd navigated corporate politics for decades and made shrewd investment decisions his whole life. Watching him piece together how it happened was like watching someone solve a puzzle in reverse.
Psychology
Information security
fromTheregister
1 month ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Information security
fromTheregister
1 month ago

BoE: UK finservs still lacking on basic cybersecurity

UK 2025 cybersecurity review finds financial firms and FMIs still lack basic safeguards: weak access controls, poor patching, misconfigurations, insufficient detection, and poor security culture.
Information security
fromSecuritymagazine
1 month ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
Information security
fromTheregister
2 months ago

Resecurity traps former ShinyHunters in honeypot

Resecurity's honeypot deceived Scattered Lapsus$ Hunters, leading to a successful login to synthetic systems and prompting a subpoena for one data thief.
#crypto-scams
fromWIRED
3 months ago
Cryptocurrency

Inside a Wild Bitcoin Heist: Five-Star Hotels, Cash-Stuffed Envelopes, and Vanishing Funds

fromWIRED
3 months ago
Cryptocurrency

Inside a Wild Bitcoin Heist: Five-Star Hotels, Cash-Stuffed Envelopes, and Vanishing Funds

Information security
fromwww.theguardian.com
2 months ago

Digital wallet fraud: how your bank card can be stolen without it leaving your wallet

Criminals use convincing bank-call tactics to get victims to approve digital-wallet additions, enabling theft through high-value purchases that empty accounts.
Information security
fromSecuritymagazine
2 months ago

Cybercrime Economics: AI's Impact and How to Shift Defenses

Generative AI has transformed fraud economics, enabling scalable, adaptive, personalized attacks that outpace traditional defenses unless defenses learn in real time.
Information security
fromThe Hacker News
2 months ago

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

Malicious actors increasingly hide within everyday technologies and trusted interfaces, making detection reliant on heightened awareness rather than larger perimeter defenses.
#cryptocurrency-theft
fromAol
2 months ago
Brooklyn

Gen Z NYC crypto crook still living with dad busted for swiping $16M in jaw-dropping digital heist

fromAol
2 months ago
Brooklyn

Gen Z NYC crypto crook still living with dad busted for swiping $16M in jaw-dropping digital heist

Information security
fromFortune
2 months ago

North Korea stole a record amount of crypto-again: report estimates its hackers' 2025 haul at $2 billion | Fortune

North Korea received roughly 59% of over $3.4 billion in stolen cryptocurrency in 2025, leveraging sophisticated laundering, insider access, AI deception, and social engineering.
fromWIRED
2 months ago

Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People's Private Data

"This took all of 20 minutes," Exempt, a member of the group that carried out the ploy, told WIRED. He claims that his group has been successful in extracting similar information from virtually every major US tech company, including Apple and Amazon, as well as more fringe platforms like video-sharing site Rumble, which is popular with far-right influencers. Exempt shared the information Charter Communications sent to the group with WIRED, and explained that the victim was a "gamer" from New York.
Privacy professionals
Information security
fromEngadget
3 months ago

Hackers tricked ChatGPT, Grok and Google into helping them install malware

Attackers seed search results with AI-generated, promoted prompts instructing users to paste malicious terminal commands, enabling remote installation of malware.
US news
fromBitcoin Magazine
3 months ago

22-Year-Old Pleads Guilty In $263 Million Crypto Scheme

A 22-year-old pleaded guilty for laundering $3.5 million in a multi-state RICO crypto theft operation that stole about $263 million.
Gadgets
fromThe Hacker News
3 months ago

ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts- and 15 More Stories

Android introduces in-call scam warnings for participating financial apps on Android 11+, pausing calls and screen sharing to interrupt social-engineering scams.
Information security
fromThe Hacker News
3 months ago

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

GoldFactory conducts mobile malware campaigns across Indonesia, Thailand, and Vietnam by distributing modified banking apps and impersonating government services to steal funds.
Information security
fromComputerWeekly.com
3 months ago

Cyber's defining lessons of 2025, and what comes next | Computer Weekly

Combine people-focused defenses, AI-aware testing, and stronger governance to counter nation-state threats, social engineering, and emerging AI-driven attack vectors.
fromSecuritymagazine
3 months ago

How to Stay Safe Online This Black Friday, According to a Cyber Expert

"The holiday season is filled with gifts, including the ones we unknowingly hand over to threat actors in the form of sharing personal information and other security mishaps that result in cyberattacks," says Nathan Wenzler, Field CISO at Optiv. "This year, consumers across the U.S. plan to spend nearly $80 billion online and in-store during Black Friday and Cyber Monday, an increase of about $20 billion compared to last year, according to a new survey conducted by Omnisend."
Information security
Information security
fromThe Hacker News
3 months ago

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

Cybercriminals impersonate financial institutions to steal money and sensitive information, enabling account takeover fraud that caused over $262 million in losses this year.
Information security
fromThe Hacker News
3 months ago

3 SOC Challenges You Need to Solve Before 2026

By 2026, threat actors will adopt AI as primary weapon, scaling attacks, automating reconnaissance, and executing hyper-realistic social engineering, forcing SOC transformation.
Information security
fromTechCrunch
3 months ago

CrowdStrike fires 'suspicious insider' who passed information to hackers | TechCrunch

CrowdStrike fired a suspicious insider who allegedly shared internal screenshots with the Scattered Lapsus$ Hunters hacking collective; the company says its systems were not compromised.
fromFortune
3 months ago

Exclusive: Doppel raises $70 million Series C at more than $600 million valuation to fight AI-powered social engineering attacks | Fortune

I tried to fool my brother, sort of. Next to him and his Pekingese on the couch, without context or introduction, I played an audio clip of me-deepfake audio of my voice that I'd asked cybersecurity startup Doppel to make. Fake Me's voice sounded distressed, stilted, and just persuasive enough that he narrowed his eyes, scrunched his nose, and asked: "That's AI, right?" My extremely online brother was far from fooled, but he was unsettled.
Artificial intelligence
fromArs Technica
3 months ago

Bonkers Bitcoin heist: 5-star hotels, cash-filled envelopes, vanishing funds

As Kent Halliburton stood in a bathroom at the Rosewood Hotel in central Amsterdam, thousands of miles from home, running his fingers through an envelope filled with 10,000 euros in crisp banknotes, he started to wonder what he had gotten himself into. Halliburton is the cofounder and CEO of Sazmining, a company that operates bitcoin mining hardware on behalf of clients-a model known as "mining-as-a-service."
Cryptocurrency
Information security
fromwww.bbc.com
3 months ago

British hacker must repay 4m after hijacking celebrity Twitter accounts

Joseph O'Connor must hand over 4.1m in stolen cryptocurrency after hijacking over 130 Twitter accounts in a July 2020 Bitcoin "giveaway" scam.
Information security
fromThe Hacker News
3 months ago

Iranian Hackers Launch 'SpearSpecter' Spy Operation on Defense & Government Targets

Iranian state-sponsored APT42 conducts the SpearSpecter espionage campaign targeting senior defense and government officials and their family members using personalized social engineering.
fromArs Technica
3 months ago

ClickFix may be the biggest security threat your family has never heard of

Another campaign, documented by Sekoia, targeted Windows users. The attackers behind it first compromise a hotel's account for Booking.com or another online travel service. Using the information stored in the compromised accounts, the attackers contact people with pending reservations, an ability that builds immediate trust with many targets, who are eager to comply with instructions, lest their stay be canceled. The site eventually presents a fake CAPTCHA notification that bears an almost identical look and feel to those required by content delivery network Cloudflare.
Information security
Information security
fromThe Hacker News
4 months ago

Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed

Multiple Microsoft Teams vulnerabilities allowed message alteration, sender impersonation, and forged notifications enabling social-engineering attacks before patches were deployed.
Information security
fromcointelegraph.com
4 months ago

Fake social media accounts: The rise of Cointelegraph impersonators, explained

Impersonation scams in crypto media are widespread in 2025, using cloned profiles to defraud projects, steal data, install malware, and drain wallets.
Information security
fromThe Hacker News
4 months ago

ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising

Attackers prioritize fewer high-impact targets while defenders face expanding blind spots and rising insider-enabled transfers of sensitive cyber-exploit tools to foreign buyers.
Information security
fromInfoQ
4 months ago

Layered Defences Are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds

AI-powered cyberattacks are increasingly sophisticated, requiring organisations to implement multi-layered, integrated security measures and continuous monitoring across cloud and hybrid environments.
Information security
fromFuturism
4 months ago

If You're a Tech Worker With an Attractive Girlfriend, We Have Extremely Bad News

Foreign intelligence services allegedly use romantic relationships to extract secrets from Western tech professionals, reviving Cold War-era "honey trap" tactics.
[ Load more ]