Social Engineering

Can Cyber Security Simulation Training Stop Social Engineering Attacks?

Social engineering attacks continue to dominate the cyber security threat landscape, and organizations that aren’t paying attention could end up…

1 month ago

Hackers Using YouTube Links and Microsoft 365 Themes to Steal Logins

Cybercriminals are executing sophisticated phishing attacks targeting Microsoft 365 users by employing deceptive URLs that closely resemble legitimate O365 domains,…

3 months ago

Hackers Targeting Users Who Lodged Complaints On Government portal To Steal Credit Card Data

Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By impersonating government officials, they target…

3 months ago

Hackers Mimic Social Security Administration To Deliver ConnectWise RAT

A phishing campaign spoofing the United States Social Security Administration emerged in September 2024, delivering emails with embedded links to…

3 months ago

Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware

Through the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign.  A…

4 months ago

Beware Of SpyLoan Apps Exploits Social Engineering To Steal User Data

SpyLoan apps, a type of PUP, are rapidly increasing, exploiting social engineering to deceive users into granting excessive permissions, where…

4 months ago

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022 by employing sophisticated social engineering…

5 months ago

Beware Of Callback Phishing Attacks Google Groups That Steal Login Details

Callback phishing is a two-step attack involving phishing emails and phone calls. Victims are lured into calling a bogus number…

5 months ago

Beware Of Malicious Crypto Management App That Drains Your Wallet

A forwarded Telegram video advertises heavily discounted, high-profile cryptocurrency projects, enticing viewers with links to a seemingly legitimate second-tier exchange…

8 months ago

Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins

Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive…

8 months ago