social engineering attacks
Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks
Barry Strauss | | breaches, Cloud Email Security, credential harvesting, credential stealing, CTO Corner, Email Protection, generative AI, Phishing, Phishing Attacks, social engineering attacks, threat detection
Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
CapraRAT Spyware Masks As Popular Android Apps
Wajahat Raja | | CapraRAT spyware, CapraTube campaign, Cyber espionage Android apps, Cybersecurity News, Malware-laced Android apps, social engineering attacks
In the realm of cybercrime, a threat actor by the name of Transparent Tribe is rapidly spreading the CapraRAT spyware by disguising it as popular Android apps. Media reports claim that these ...
Bing Chat Malware Alert: Stay Safe from Malicious Sites
Wajahat Raja | | Bing Chat, Cybersecurity News, cybersecurity threats, email-based attacks, malware distribution, social engineering attacks
In a concerning development, fraudulent advertising has infiltrated Microsoft’s Bing Chat AI chatbot, possibly exposing unsuspecting users to malware-infected websites. These Bing Chat malware findings shed light on a new channel that ...
Psychological Manipulation in Social Engineering: Unveiling the Tactics
Khushboo Chahal | | Awareness, Cyber Security, social engineering, social engineering attacks, threat-simulation
Have you ever found yourself in a situation where you felt like someone was trying to manipulate you into doing something you didn’t want to do? Perhaps it was a friend, family ...
Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist
Tom Eston | | AI Tools, ATM fraud, Chase Bank, Contactless Payment, Convenience vs Security, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Exynos Chipsets, Hidden Cameras, Information Security, Infosec, mobile device security, PIN Security, Podcast, Podcasts, Privacy, Remote Code Execution, ReSpeacher, Samsung Chipsets, security, Skimmer Technology, social engineering attacks, Tap-Enabled Debit Cards, Tavora, technology, Voice Cloning, Voice over LTE, Weekly Edition, WiFi Calling, zero-day vulnerabilities
In this episode we discuss Google’s discovery of 18 zero-day vulnerabilities in Samsung’s Exynos chipsets. We examine an AI-assisted social engineering campaign that combines emerging technologies with classic techniques. Finally, we look ...
How Brand Protection Can Address the Risk of GAN Deepfakes
Deepfakes are a concept that has taken root in popular culture. Most deepfakes are benign; the good ones go viral and can often make us laugh. But in the very near future, ...
Security Boulevard
Fall for Phishing? You Could Get Fired
One in four employees lost their job in the last 12 months after making a mistake that compromised their company’s security, according to a report from email security company Tessian. While the ...
Security Boulevard
Cybercriminals Using QR Codes to Steal Financial Info, FBI Warns
Nathan Eddy | | cryptocurrency, cybercriminals, Mobile Security, QR code, social engineering attacks
Cybercriminals are tampering with quick response (QR) codes to redirect victims to malicious sites that steal login and financial information, the FBI warned in an alert published last week. QR codes are ...
Security Boulevard
Cybercrime: Rising Concern to Cyber World
Kumar Shantanu | | Cyber Security, cybercrime, cybercriminals, cybersecurity breach, social engineering attacks, ThreatCop
As per an article by The Hindu, 50,035 cases of cybercrime were reported in 2020, 11.8% more than in 2019 while 60.2% of cybercrimes were of fraud. Every organization or institution has ...
Propaganda as a Social Engineering Tool
Sue Poremba | | Deep Fake, disinformation, fake news, Misinformation, Phishing, social engineering attacks
Remember WYSIWYG? What you see is what you get. That was a simpler time in technology; you knew what the end result would be during the development stage. There were no surprises ...
Security Boulevard