Social Engineering

Social Engineering

DonkeyHotey (cc:by-sa)

Don’t Mess With Texas Privacy: AG Sues GM for $18 BILLION

KP♡TX PII: “General Motors has engaged in egregious business practices that violated Texans’ pri­vacy … in unthinkable ways,” rants state attorney general Ken Paxton (pictured) ...
Security Boulevard
U.S. Election Meddling Iran Biden Trump

Google: Iranian Group APT42 Behind Trump, Biden Hack Attempts

Google cybersecurity researchers confirm that the Iranian-sponsored APT42 threat group is being ongoing phishing campaigns against President Biden, Vice President Harris, and ex-President Trump in an attempt to influence the upcoming presidential ...
Security Boulevard
North Korea

WTH? DPRK WFH Ransomware Redux: 3rd Person Charged

North Korean army of remote IT workers enabled by Matthew Isaac Knoot, alleges DoJ ...
Security Boulevard
The War for Control of DNS Encryption | Paul Vixie | WWHF Deadwood 2020 Virtual

Sleeping With the Phishes

PHISHING SCHOOLHiding C2 With Stealthy Callback ChannelsWrite a custom command and control (C2) implant — Check ✅Test it on your system — Check ✅Test it in a lab against your client’s endpoint detection and response (EDR) product — Check ✅Convince a target ...
North Korea fake IT worker scam PCs

DOJ Shuts Down Another North Korean ‘Laptop Farm’

The DOJ shut down another "laptop farm" link to a North Korean fake IT worker scam that the country uses to illegally bring in money for its nuclear and ballistic weapons program ...
Security Boulevard
cybersecurity Iran Russia Trump disinformation elections

Trump Campaign Hack Points to Growing U.S. Election Threats

The Trump campaign is claiming a hack is the work of Iranian operatives, adding to expanding election-interference campaigns that also include China and Russia, which the federal government calls the "predominant threat ...
Security Boulevard
How Hackers Steal Your RFID Cards

How Hackers Steal Your RFID Cards

Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...
vishing, romance scams generative AI pig butchering

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

The best way to defend against vishing attacks is by educating ourselves on how threat actors operate, and to become familiar with the tools, techniques and procedures used to carry out these ...
Security Boulevard
TikTok Abuses Kids, say DoJ and FTC

TikTok Abuses Kids, say DoJ and FTC

For You Plague: U.S. Justice Dept. and Federal Trade Commission file lawsuit, alleging TikTok broke the COPPA law, plus a previous injunction ...
Security Boulevard

Application Security Check Up