Tag: social engineering
-
Hacker News: SEAL Advisory on DPRK Threat to Crypto Exchanges
Source URL: https://www.securityalliance.org/news/2025-02-dprk-advisory Source: Hacker News Title: SEAL Advisory on DPRK Threat to Crypto Exchanges Feedly Summary: Comments AI Summary and Description: Yes Summary: The text describes a significant cyber theft by DPRK operatives, detailing their sophisticated tactics for compromising crypto exchanges. It emphasizes the importance of internal reviews and specific security measures for exchanges…
-
The Register: Experts race to extract intel from Black Basta internal chat leaks
Source URL: https://www.theregister.com/2025/02/21/experts_race_to_extract_intel/ Source: The Register Title: Experts race to extract intel from Black Basta internal chat leaks Feedly Summary: Researchers say there’s dissent in the ranks. Plus: An AI tool lets you have a go yourself at analysing the data Hundreds of thousands of internal messages from the Black Basta ransomware gang were leaked…
-
Hacker News: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger Source: Hacker News Title: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text highlights the recent surge in targeted phishing and exploitation activities against the Signal messaging application by Russian state-aligned threat actors, driven by geopolitical motivations amid the ongoing conflict in…
-
Cloud Blog: Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/ Source: Cloud Blog Title: Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger Feedly Summary: Written by: Dan Black Google Threat Intelligence Group (GTIG) has observed increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russia’s intelligence services. While this…
-
Hacker News: Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication
Source URL: https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/ Source: Hacker News Title: Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses a series of spear-phishing campaigns carried out by Russian threat actors targeting Microsoft 365 accounts using Device Code Authentication. The attacks leverage social engineering tactics, exploiting political…
-
The Register: If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish
Source URL: https://www.theregister.com/2025/02/15/russia_spies_spoofing_teams/ Source: The Register Title: If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish Feedly Summary: Roses aren’t cheap, violets are dear, now all your access token are belong to Vladimir Digital thieves – quite possibly Kremlin-linked baddies – have been emailing out bogus…
-
The Register: North Korea targets crypto developers via NPM supply chain attack
Source URL: https://www.theregister.com/2025/02/13/north_korea_npm_crypto/ Source: The Register Title: North Korea targets crypto developers via NPM supply chain attack Feedly Summary: Yet another cash grab from Kim’s cronies and an intel update from Microsoft North Korea has changed tack: its latest campaign targets the NPM registry and owners of Exodus and Atomic cryptocurrency wallets.… AI Summary and…
-
Cloud Blog: Cybercrime: A Multifaceted National Security Threat
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cybercrime-multifaceted-national-security-threat/ Source: Cloud Blog Title: Cybercrime: A Multifaceted National Security Threat Feedly Summary: Executive Summary Cybercrime makes up a majority of the malicious activity online and occupies the majority of defenders’ resources. In 2024, Mandiant Consulting responded to almost four times more intrusions conducted by financially motivated actors than state-backed intrusions. Despite this…
-
Embrace The Red: Hacking Gemini’s Memory with Prompt Injection and Delayed Tool Invocation
Source URL: https://embracethered.com/blog/posts/2025/gemini-memory-persistence-prompt-injection/ Source: Embrace The Red Title: Hacking Gemini’s Memory with Prompt Injection and Delayed Tool Invocation Feedly Summary: Imagine your AI rewriting your personal history… A while ago Google added memories to Gemini. Memories allow Gemini to store user-related data across sessions, storing information in long-term memory. The feature is only available to…
-
Rekt: Ionic Money – Rekt
Source URL: https://www.rekt.news/ionic-money-rekt Source: Rekt Title: Ionic Money – Rekt Feedly Summary: Fake LBTC, real losses. Social engineering artists convinced Ionic Money on Mode Network to accept counterfeit collateral, walked away with $6.9M, and left sister protocols holding toxic bags. Previously exploited twice as Midas – third time rekt’s the charm. AI Summary and Description:…