Tag: social engineering techniques
-
Cisco Talos Blog: One mighty fine-looking report
Source URL: https://blog.talosintelligence.com/one-mighty-fine-looking-report/ Source: Cisco Talos Blog Title: One mighty fine-looking report Feedly Summary: Hazel highlights the key findings within Cisco Talos’ 2024 Year in Review (now available for download) and details our active tracking of an ongoing campaign targeting users in Ukraine with malicious LNK files. AI Summary and Description: Yes Summary: The Threat…
-
Unit 42: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon
Source URL: https://unit42.paloaltonetworks.com/qr-code-phishing/ Source: Unit 42 Title: Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon Feedly Summary: Phishing with QR codes: New tactics described here include concealing links with redirects and using Cloudflare Turnstile to evade security crawlers. The post Evolution of Sophisticated Phishing Tactics: The QR Code Phenomenon appeared first on Unit 42.…
-
Microsoft Security Blog: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware
Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/ Source: Microsoft Security Blog Title: Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware Feedly Summary: Starting in December 2024, leading up to some of the busiest travel days, Microsoft Threat Intelligence identified a phishing campaign that impersonates online travel agency Booking.com and targets organizations in the hospitality industry. The…
-
Unit 42: Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems
Source URL: https://unit42.paloaltonetworks.com/?p=138517 Source: Unit 42 Title: Beneath the Surface: Detecting and Blocking Hidden Malicious Traffic Distribution Systems Feedly Summary: A topological analysis and case studies add nuance to a study of malicious traffic distribution systems. We compare their use by attackers to benign systems. The post Beneath the Surface: Detecting and Blocking Hidden Malicious…
-
Rekt: Pwnedbase
Source URL: https://www.rekt.news/pwnedbase Source: Rekt Title: Pwnedbase Feedly Summary: Coinbase users lost $65M in 2 months while support tickets gathered dust. Scammers ran a tighter ship than their security team. ZachXBT’s investigation reveals the real damage. $300M lost annually while Coinbase chases banking powers. AI Summary and Description: Yes Summary: The text highlights significant security…
-
Bulletins: Vulnerability Summary for the Week of December 2, 2024
Source URL: https://www.cisa.gov/news-events/bulletins/sb24-344 Source: Bulletins Title: Vulnerability Summary for the Week of December 2, 2024 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description8 Published CVSS Score Source Info SailPoint Technologies–IdentityIQ IdentityIQ 8.4 and all 8.4 patch levels prior to 8.4p2, IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p5, IdentityIQ 8.2 and all 8.2…
-
CSA: Cloud Security in Five Key Steps
Source URL: https://www.tenable.com/blog/how-to-protect-your-cloud-environments-and-prevent-data-breaches Source: CSA Title: Cloud Security in Five Key Steps Feedly Summary: AI Summary and Description: Yes **Summary:** The text addresses the rapidly evolving landscape of cloud computing security, highlighting the increased risks associated with cloud adoption and providing actionable strategies for organizations to bolster their defenses. It emphasizes the necessity of a…
-
Hacker News: A Day in the Life of a Prolific Voice Phishing Crew
Source URL: https://krebsonsecurity.com/2025/01/a-day-in-the-life-of-a-prolific-voice-phishing-crew/ Source: Hacker News Title: A Day in the Life of a Prolific Voice Phishing Crew Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text delves into the disturbing and sophisticated tactics utilized by voice phishing gangs, primarily focusing on a group known as “Crypto Chameleon.” It highlights how these criminals…
-
Krebs on Security: How to Lose a Fortune with Just One Bad Click
Source URL: https://krebsonsecurity.com/2024/12/how-to-lose-a-fortune-with-just-one-bad-click/ Source: Krebs on Security Title: How to Lose a Fortune with Just One Bad Click Feedly Summary: Adam Griffin is still in disbelief over how quickly he was robbed of nearly $500,000 in cryptocurrencies. A scammer called using a real Google phone number to warn his Gmail account was being hacked, sent…
-
Hacker News: The EU Throws a Hand Grenade on Software Liability
Source URL: https://www.lawfaremedia.org/article/the-eu-throws-a-hand-grenade-on-software-liability Source: Hacker News Title: The EU Throws a Hand Grenade on Software Liability Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses significant developments regarding software liability in the EU and the U.S., contrasting the proactive measures taken by the EU to hold software producers accountable with the U.S.’s…