Security News

Social Engineering Awareness Policy
2024-07-09 16:00

The purpose of this customizable Social Engineering Awareness Policy, written by Maria Carrisa Sanchez for TechRepublic Premium, is to provide guidelines for preventing, recognizing and addressing social engineering attacks. Regular update of passwords: The company believes passwords serve as the fundamental line of security against unwanted access.

Malware peddlers love this one social engineering trick!
2024-06-17 13:14

Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. Getting users to install malware on their computers was always a matter of finding the right lure and bypassing security protections.

Protecting identity in a world of deepfakes and social engineering
2024-06-10 03:00

In this Help Net Security video round-up, security experts discuss various aspects of identity verification and security, including generative AI's impact, the state of identity fraud prevention, and the potential impact of identity challenges on the security sector. Complete videos Peter Violaris, Head of Legal, Compliance and Risk, EMEA for OCR Labs, discusses generative AI's impact on identity verification.

90% of threats are social engineering
2024-06-06 03:30

The report highlights significant trends and incidents in cybersecurity. Surge in social engineering attacks: Nearly 90% of threats blocked were social engineering-based, with scams and phishing on the rise, particularly utilizing deepfake technology and hijacked YouTube channels.

Week in review: New Black Basta’s social engineering campaign, passing the CISSP exam in 6 weeks
2024-05-19 08:00

How a GRC consultant passed the CISSP exam in six weeksAsk any IT security professional which certification they would consider to be the "Gold standard" in terms of prestige, credibility, or difficulty, and almost invariably they will answer: the CISSP. BLint: Open-source tool to check the security properties of your executablesBLint is a Binary Linter designed to evaluate your executables' security properties and capabilities, utilizing LIEF for its operations. OWASP dep-scan: Open-source security and risk audit toolOWASP dep-scan is an open-source security and risk assessment tool that leverages information on vulnerabilities, advisories, and licensing restrictions for project dependencies.

Black Basta target orgs with new social engineering campaign
2024-05-13 12:39

The advisory lists indicators of compromise associated with Black Basta ransomware attacks and offers advice for organizations. Rapid7 analysts have also shared the latest social engineering trick by the Black Basta operators: they spam targets' inbox with junk email, then phone them posing as a member of their organization's IT team, and offer assistance.

How to make your web apps resistant to social engineering
2024-04-16 14:02

Despite this, there are still things that you can do to make your web apps more resistant to social engineering. With this in mind, consider implementing these strategies at your organization to protect your web applications and reduce the chance of falling victim to social engineering.

4 Ways Hackers use Social Engineering to Bypass MFA
2024-02-12 11:14

When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential...

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware
2023-12-12 19:00

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. A new report from U.S.-based cybersecurity company Proofpoint exposes a new attack campaign operated by a financially-oriented threat actor dubbed TA4557 with high financial data theft risks and possibly more risks such as intellectual property theft.

Webinar — Psychology of Social Engineering: Decoding the Mind of a Cyber Attacker
2023-12-11 10:53

In the ever-evolving cybersecurity landscape, one method stands out for its chilling effectiveness – social engineering. But why does it work so well? The answer lies in the intricate dance...