Tag: voice phishing
-
Krebs on Security: ShinyHunters Wage Broad Corporate Extortion Spree
Source URL: https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/ Source: Krebs on Security Title: ShinyHunters Wage Broad Corporate Extortion Spree Feedly Summary: A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched a website that threatens to publish data stolen from dozens of Fortune 500 firms if they…
-
Cloud Blog: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations/ Source: Cloud Blog Title: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations Feedly Summary: Written by: Omar ElAhdan, Matthew McWhirt, Michael Rudden, Aswad Robinson, Bhavesh Dhake, Laith Al Background Protecting software-as-a-service (SaaS) platforms and applications requires a comprehensive security strategy. Drawing…
-
Krebs on Security: The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft
Source URL: https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chatbot-maker-salesloft/ Source: Krebs on Security Title: The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft Feedly Summary: The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America to convert customer interaction into Salesforce leads, has left many companies racing to invalidate…
-
Slashdot: Google Suffers Data Breach in Ongoing Salesforce Data Theft Attacks
Source URL: https://tech.slashdot.org/story/25/08/06/1556252/google-suffers-data-breach-in-ongoing-salesforce-data-theft-attacks Source: Slashdot Title: Google Suffers Data Breach in Ongoing Salesforce Data Theft Attacks Feedly Summary: AI Summary and Description: Yes Summary: The text describes a recent data breach incident involving Google, where the company fell victim to a Salesforce CRM data theft orchestrated by the ShinyHunters group. This incident highlights the growing…
-
Cisco Talos Blog: Unmasking the new Chaos RaaS group attacks
Source URL: https://blog.talosintelligence.com/new-chaos-ransomware/ Source: Cisco Talos Blog Title: Unmasking the new Chaos RaaS group attacks Feedly Summary: Cisco Talos Incident Response (Talos IR) recently observed attacks by Chaos, a relatively new ransomware-as-a-service (RaaS) group conducting big-game hunting and double extortion attacks. AI Summary and Description: Yes Summary: The text reveals in-depth information about the…
-
Cloud Blog: Cloud CISO Perspectives: How Google secures AI Agents
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-google-secures-ai-agents/ Source: Cloud Blog Title: Cloud CISO Perspectives: How Google secures AI Agents Feedly Summary: Welcome to the first Cloud CISO Perspectives for June 2025. Today, Anton Chuvakin, security advisor for Google Cloud’s Office of the CISO, discusses a new Google report on securing AI agents, and the new security paradigm they demand.As…
-
Slashdot: Fake IT Support Calls Hit 20 Orgs, End in Stolen Salesforce Data and Extortion, Google Warns
Source URL: https://it.slashdot.org/story/25/06/04/1654250/fake-it-support-calls-hit-20-orgs-end-in-stolen-salesforce-data-and-extortion-google-warns?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Fake IT Support Calls Hit 20 Orgs, End in Stolen Salesforce Data and Extortion, Google Warns Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a cybersecurity incident involving a group of financially motivated scammers, known as UNC6040, who executed voice-phishing attacks to manipulate employees into installing…
-
Cloud Blog: Hello, Operator? A Technical Analysis of Vishing Threats
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/technical-analysis-vishing-threats/ Source: Cloud Blog Title: Hello, Operator? A Technical Analysis of Vishing Threats Feedly Summary: Written by: Nick Guttilla Introduction Organizations are increasingly relying on diverse digital communication channels for essential business operations. The way employees interact with colleagues, access corporate resources, and especially, receive information technology (IT) support is often conducted through…
-
Cloud Blog: The Cost of a Call: From Voice Phishing to Data Extortion
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion/ Source: Cloud Blog Title: The Cost of a Call: From Voice Phishing to Data Extortion Feedly Summary: Introduction Google Threat Intelligence Group (GTIG) is tracking UNC6040, a financially motivated threat cluster that specializes in voice phishing (vishing) campaigns specifically designed to compromise organization’s Salesforce instances for large-scale data theft and subsequent extortion.…
-
Slashdot: FBI: US Officials Targeted In Voice Deepfake Attacks Since April
Source URL: https://yro.slashdot.org/story/25/05/15/2138238/fbi-us-officials-targeted-in-voice-deepfake-attacks-since-april?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: FBI: US Officials Targeted In Voice Deepfake Attacks Since April Feedly Summary: AI Summary and Description: Yes Summary: The FBI has warned about cybercriminals leveraging AI-generated voice deepfakes to impersonate senior U.S. officials in phishing attacks, using techniques such as smishing and vishing. These tactics are designed to compromise…