#social-engineering

[ follow ]
Information security
fromFuturism
1 day ago

If You're a Tech Worker With an Attractive Girlfriend, We Have Extremely Bad News

Foreign intelligence services allegedly use romantic relationships to extract secrets from Western tech professionals, reviving Cold War-era "honey trap" tactics.
#phishing
fromComputerworld
1 day ago
Information security

Scammers try to trick LastPass users into giving up credentials by telling them they're dead

fromZDNET
3 weeks ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromIT Pro
2 months ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

fromwww.itpro.com
3 months ago
Information security

New hires are your weakest link when it comes to phishing attacks here's how you can build a strong security culture that doesn't judge victims

fromComputerworld
1 day ago
Information security

Scammers try to trick LastPass users into giving up credentials by telling them they're dead

fromZDNET
3 weeks ago
Information security

4 better ways to protect your business than dreaded (and useless) anti-phishing training

fromIT Pro
2 months ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

fromwww.itpro.com
3 months ago
Information security

New hires are your weakest link when it comes to phishing attacks here's how you can build a strong security culture that doesn't judge victims

#clickfix
fromZDNET
3 days ago
Information security

Your phishing detection skills are no match for 2025's biggest security threats

fromZDNET
4 days ago
Information security

How Clickfix and AI are helping hackers break into your systems - at an alarming rate

fromZDNET
1 week ago
Information security

ClickFix attacks are surging, and Microsoft says you are the only defense

fromZDNET
3 days ago
Information security

Your phishing detection skills are no match for 2025's biggest security threats

fromZDNET
4 days ago
Information security

How Clickfix and AI are helping hackers break into your systems - at an alarming rate

fromZDNET
1 week ago
Information security

ClickFix attacks are surging, and Microsoft says you are the only defense

Information security
fromZDNET
3 days ago

Don't be tempted by this scam on YouTube - how to protect yourself

A large, long-running YouTube-based malware network used tutorial videos offering cracked software and game hacks to trick users into disabling security and installing malware.
Information security
fromTheregister
3 days ago

Google and Check Point nuke massive YouTube malware network

Malicious YouTube videos posing as cracked software and game cheats distributed infostealers by using fake or compromised accounts and manipulated engagement to deceive users.
Information security
fromZDNET
5 days ago

TikTok video promising you free Photoshop or Windows license? Don't do it - it's a scam

TikTok is being used to deliver ClickFix social engineering attacks that trick users into running commands to install information-stealing malware like AuroStealer.
Information security
fromThe Cipher Brief
5 days ago

AI-Powered Adversaries Require AI-Driven Defenses

Adversaries increasingly use AI for social engineering, information operations, code assistance, and deepfakes, while defensive AI offers opportunities to detect and counter emerging threats.
fromABC7 Los Angeles
5 days ago

North Carolina man's crypto account drained of $80,000 after he clicks on link for virtual meeting

"I started to create videos about cryptocurrency and launch my own exchange on cryptocurrency," the Durham, North Carolina, resident said.
Information security
Information security
fromIT Pro
6 days ago

Europol takes down SIM farm network that scammed thousands of victims

A Latvian cybercrime-as-a-service ring built SIM-based infrastructure, created nearly 50 million fake accounts, enabled widespread European fraud, leading to seven arrests.
fromTechzine Global
6 days ago

Google Ads lead macOS developers to malware

The campaign spreads the Odyssey Stealer and AMOS (Atomic macOS Stealer) malware families. Both families focus on stealing system information, browser data, and crypto wallet login details. The attacks are carefully designed to exploit developers' trust. The fake Homebrew and TradingView sites display seemingly legitimate download portals with buttons such as Copy command. When a user clicks the button, a hidden, base64-encoded Terminal command is copied to the clipboard.
Information security
Books
fromwww.theguardian.com
1 week ago

Techno-capitalists think innovation can save the planet. But that same thinking is what got us here

Technological fixes increasingly aim to reshape nature to fit engineered systems, inverting the human–world relationship and risking loss of human freedom and dignity.
Information security
fromTheregister
1 week ago

Norks abuse blockchains to scam job seekers, steal wallets

North Korean threat actors embed malware in blockchain smart contracts (EtherHiding) to target developers, steal cryptocurrency and credentials, and maintain stealthy persistent access.
Information security
fromTheregister
1 week ago

Locked out of your Gmail account? Google says call a friend

Gmail allows users to designate trusted contacts who can receive recovery codes and assist account recovery when other authentication methods are unavailable.
Information security
fromSecuritymagazine
2 weeks ago

Help Desk Havoc: Why Identity Verification Is Still the Weakest Link in Targeted Attacks

Help desks are a critical, under-protected attack vector in zero trust deployments, enabling social-engineering breaches that bypass authentication and cause major disruption.
Information security
fromSecurityWeek
2 weeks ago

In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

Active exploitation of Gladinet and Zimbra vulnerabilities and social-engineered payroll attacks against US universities have led to ongoing mitigations and warnings.
fromSecuritymagazine
2 weeks ago

85,000 Pet and Pet Owner Records Exposed

Cybersecurity Researcher Jeremiah Fowler discovered a database that lacked password protection as well as encryption, exposing 85,361 files (158 GB in total). The records included invoices, claims, and emails that contained policy holder names, addresses, phone numbers, email addresses, and other personally identifiable information (PII). The personal information of pets were also exposed, including their names, ages, breeds, medical histories, microchip numbers, and more.
Information security
#north-korea
fromTechCrunch
2 weeks ago
Information security

North Korean hackers stole over $2 billion in crypto so far in 2025, researchers say | TechCrunch

fromTechCrunch
2 weeks ago
Information security

North Korean hackers stole over $2 billion in crypto so far in 2025, researchers say | TechCrunch

fromThe Hacker News
2 weeks ago

BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers

The attack chains, per the cybersecurity company, leverage ZIP archives containing decoy PDF documents along with malicious shortcut (LNK) or executable files that are masked as PDF to trick users into opening them. When launched, the LNK file runs an embedded PowerShell script that reaches out to an external server to download a lure document, a PDF for a marketing job at Marriott.
Information security
#salesforce-breach
fromMarTech
2 weeks ago
Information security

Salesforce says social engineering to blame for breaches leading to ransom demands | MarTech

fromMarTech
2 weeks ago
Information security

Salesforce says social engineering to blame for breaches leading to ransom demands | MarTech

Information security
fromTheregister
3 weeks ago

Kodex outage blamed on AWS social engineering attack

Social engineering against AWS froze Kodex Global's domain, causing service outages and risking email interception despite Kodex claiming no internal breach.
Information security
fromTalentLMS Blog
3 weeks ago

10 Essential Cybersecurity Topics for Employee Training

Comprehensive cybersecurity training for all employees prevents breaches, protects data, preserves customer trust, and reduces financial, legal, and reputational damage.
Information security
fromThe Hacker News
3 weeks ago

New Android Banking Trojan "Klopatra" Uses Hidden VNC to Control Infected Smartphones

Klopatra Android banking trojan has compromised over 3,000 devices using VNC and dynamic overlays to enable remote control, credential theft, and fraudulent transactions.
fromThe Hacker News
3 weeks ago

New Android Trojan "Datzbro" Tricking Elderly with AI-Generated Facebook Travel Events

Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting "active senior trips." Some of the other territories targeted by the threat actors include Singapore, Malaysia, Canada, South Africa, and the U.K. The campaigns, it added, specifically focused on elderly people looking for social activities, trips, in-person meetings, and similar events. These Facebook groups have been found to share artificial intelligence (AI)-generated content, claiming to organize various activities for seniors.
Privacy technologies
#cybersecurity
fromFortune
3 weeks ago
Information security

Cybersecurity professionals under pressure turn to AI amid rising threats | Fortune

fromSFGATE
1 month ago
Information security

Teen arrested on suspicion of Vegas Strip attack that cost $100M

fromTechRadar
1 month ago
Information security

I am a cybersecurity expert - here's why it's time for businesses to bolster defenses, beyond just tech

Information security
fromThe Hacker News
2 months ago

Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware

EncryptHub exploits a security flaw in Microsoft Windows to deploy malicious payloads via social engineering tactics.
fromFortune
3 weeks ago
Information security

Cybersecurity professionals under pressure turn to AI amid rising threats | Fortune

fromSFGATE
1 month ago
Information security

Teen arrested on suspicion of Vegas Strip attack that cost $100M

fromTechRadar
1 month ago
Information security

I am a cybersecurity expert - here's why it's time for businesses to bolster defenses, beyond just tech

Information security
fromwww.bbc.com
3 weeks ago

'You'll never need to work again': Criminals offer reporter money to hack BBC

Criminal gangs recruit insiders by offering employees a percentage of ransom payments in exchange for login credentials and PC access to facilitate ransomware attacks.
Information security
fromThe Hacker News
1 month ago

North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers

North Korea-linked actors use multi-platform malware including AkdoorTea to target cryptocurrency and Web3 developers via fake recruiter job offers that install backdoors.
Information security
fromTheregister
1 month ago

Deepfaked calls hit 44% of businesses in last year: Gartner

AI-generated deepfakes and prompt-injection attacks targeted staff, with audio and video deepfakes causing operational and financial losses and evading detection.
#scattered-spider
Information security
fromFortune
1 month ago

London teenager orchestrated 'help desk' extortion scheme against 47 U.S. companies that netted $115 million says DOJ | Fortune

A 19-year-old London resident allegedly led social-engineering attacks that extorted $115 million, compromising at least 120 networks and targeting 47 U.S. entities including federal courts.
#data-breach
fromIT Pro
1 month ago
Information security

The Salesloft hackers claim they have 1.5 billion compromised Salesforce records

fromTechCrunch
1 month ago
Information security

VC giant Insight Partners notifies staff and limited partners after data breach | TechCrunch

fromIT Pro
1 month ago
Information security

The Salesloft hackers claim they have 1.5 billion compromised Salesforce records

fromTechCrunch
1 month ago
Information security

VC giant Insight Partners notifies staff and limited partners after data breach | TechCrunch

#ransomware
fromTheregister
1 month ago

FileFix attacks trick victims into executing infostealers

FileFix is a variation on ClickFix, a newish type of social-engineering technique first spotted last year that tricks victims into running malware on their own devices using fake fixes and login prompts. These types of attacks have surged by 517 percent in the past six months, according to researchers at antivirus and internet security software vendor ESET, making them second most common attack vector behind phishing.
Information security
Information security
fromCyberScoop
1 month ago

The npm incident frightened everyone, but ended up being nothing to fret about

A social-engineering compromise of an npm maintainer briefly poisoned 18 popular packages, but quick detection and response limited the supply-chain attack’s impact and damage.
Artificial intelligence
fromWIRED
1 month ago

Psychological Tricks Can Get AI to Break the Rules

Human-style persuasion techniques can often cause some LLMs to violate system prompts and comply with objectionable requests.
Information security
fromTheregister
1 month ago

Double trouble with CastleRAT malware, now in C and Python

TAG-150 created CastleRAT in Python and C, using ClickFix social engineering to trick users into pasting commands that enable remote access and payload delivery.
Information security
fromIT Pro
1 month ago

Cybersecurity experts issue urgent warning amid surge in Stealerium malware attacks

Stealerium infostealer has surged, exfiltrating credentials, crypto wallets, Wi‑Fi and VPN data via multiple channels and leveraging social‑engineering lures for global campaigns.
Information security
fromThe Hacker News
1 month ago

Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE

Lazarus Group used a Telegram social-engineering campaign to deliver PondRAT, ThemeForestRAT, and RemotePE, enabling credential theft and network discovery in a DeFi organization.
History
fromPsychology Today
2 months ago

The Man Who Sold a Fake Country

Con artists exploit timeless human psychology—scarcity, forged credibility, and persuasive storytelling—to sell false opportunities across eras, from 19th-century Poyais to modern online scams.
fromThe Hacker News
2 months ago

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

Instead of sending unsolicited phishing emails, attackers initiate contact through a company's public 'Contact Us' form, tricking employees into starting the conversation. What follows are weeks of professional, credible exchanges, often sealed with fake NDAs, before delivering a weaponized ZIP file carrying MixShell, a stealthy in-memory malware.
Information security
Information security
fromIT Pro
2 months ago

Has password hygiene ever improved?

Passwords are fundamentally insecure and human-dependent, enabling breaches that can topple organizations; static credentials must be eliminated in favor of stronger authentication.
Information security
fromTheregister
2 months ago

'Impersonation as a service' next big thing in cybercrime

Demand for English-language social engineering skills has surged, enabling impersonation-as-a-service operations that facilitate Salesforce intrusions and financially motivated attacks.
#malware
Apple
fromSecuritymagazine
3 months ago

New ZuRu Malware Variant Targeting Developers

ZuRu is a trojan malware for macOS that spreads through trojanized legitimate software and relies on social engineering tactics.
Privacy professionals
fromSecuritymagazine
3 months ago

Security Leaders Discuss Marco Rubio AI Imposter

AI-generated impersonation attempts pose serious risks to information security and can bypass human caution.
Generative AI tools have reached a level of sophistication that allows for credible impersonations.
[ Load more ]