Topic: social engineering

  • The $400M Password Problem: Can You Get a New One?

    The $400M Password Problem: Can You Get a New One?

    A social engineering attack on Clorox, executed by impersonating employees and manipulating an outsourced service desk, led to an estimated $380 million in damages by exploiting weak password and MFA reset procedures. The breach caused severe operational disruptions, including halted production a...

    Read More »
  • 98% of Cyberattacks Exploit Human Error, UAE Council Warns

    98% of Cyberattacks Exploit Human Error, UAE Council Warns

    98% of successful cyberattacks are due to human error, with criminals increasingly using psychological manipulation rather than technical exploits. Attackers employ social engineering tactics like impersonation, fake rewards, and urgency to trick individuals into revealing sensitive information. ...

    Read More »
  • Two-Thirds of Firms Hit by Deepfake Attacks

    Two-Thirds of Firms Hit by Deepfake Attacks

    A majority of organizations (62%) experienced a deepfake attack in the past year, often using social engineering to impersonate leaders or manipulate automated verification systems. The threat is growing as deepfake technology becomes more accessible, with the combination of deepfakes and social ...

    Read More »
  • M&S hit by ransomware attack due to social engineering

    M&S hit by ransomware attack due to social engineering

    M&S suffered a ransomware attack after cybercriminals used social engineering to impersonate an employee, gaining access via a third-party provider and deploying DragonForce ransomware. The attack involved detailed impersonation tactics, potentially facilitated by Tata Consultancy Services, and e...

    Read More »
  • Russian Hackers Bypass Two-Factor Authentication in New Attack

    Russian Hackers Bypass Two-Factor Authentication in New Attack

    Russian hackers bypassed two-factor authentication (2FA) using social engineering, exploiting legitimate account features like Gmail's "app password" to target high-profile individuals. A British researcher, Keir Giles, was tricked by hackers posing as U.S. officials, who used forged documents an...

    Read More »
  • ClickFix Exploits MHSTA to Evade Security for Infostealers

    ClickFix Exploits MHSTA to Evade Security for Infostealers

    ClickFix is a growing social engineering tactic that tricks users into executing harmful commands by pretending to fix system issues, often through deceptive pop-ups. ClickFix has driven a 10% increase in drive-by compromises and is now the second most common evasion technique, often exploiting t...

    Read More »
  • Bolster Defenses Against Scattered Spider Attacks, Experts Warn

    Bolster Defenses Against Scattered Spider Attacks, Experts Warn

    The Scattered Spider hacking group poses a severe threat to businesses by using sophisticated methods like social engineering and ransomware, requiring immediate improvements in identity management, security processes, and third-party risk management. Their attack strategy often starts with vishi...

    Read More »
  • Insight Partners Warns Thousands Following Ransomware Attack

    Insight Partners Warns Thousands Following Ransomware Attack

    Insight Partners suffered a cybersecurity breach due to a sophisticated social engineering attack, exposing sensitive personal and financial data of thousands. The breach occurred from October 2024 to January 2025, compromising banking details, employee records, and information on partners and po...

    Read More »
  • From ClickFix to MetaStealer: How Cyber Threats Are Evolving

    From ClickFix to MetaStealer: How Cyber Threats Are Evolving

    Cybersecurity attacks are evolving with threat actors combining social engineering and technical methods, such as using disguised installers and legitimate tools to deploy malware like MetaStealer. Recent incidents involve deceptive techniques, including fake verification pages and malicious file...

    Read More »
  • ScamAgent: How AI Is Fueling a New Era of Fraudulent Calls

    ScamAgent: How AI Is Fueling a New Era of Fraudulent Calls

    AI-driven scams are evolving to use multi-turn conversations that bypass traditional safety systems by breaking malicious intent into incremental, seemingly harmless steps. These advanced scams can adapt their approach based on victim responses, altering tone and tactics, and are increasingly rea...

    Read More »
  • Microsoft Teams Targeted by Fake IT Support Scams

    Microsoft Teams Targeted by Fake IT Support Scams

    A new wave of phishing attacks is exploiting Microsoft Teams, using fake IT support accounts to trick employees into installing malware that gives attackers full network control. Attackers are shifting from email to Teams due to its trusted role in business, impersonating IT staff to deploy remot...

    Read More »
  • Insight Partners Confirms Ransomware Data Breach

    Insight Partners Confirms Ransomware Data Breach

    Insight Partners suffered a ransomware attack that compromised sensitive personal and financial information, affecting over 12,000 individuals. The breach began in October 2024, went undetected for months, and involved advanced social engineering tactics for initial network access. Despite invest...

    Read More »
  • Insight Partners Notifies Clients of Ransomware Data Breach

    Insight Partners Notifies Clients of Ransomware Data Breach

    Insight Partners disclosed a ransomware attack that began in October 2024, was detected in January 2025, and compromised personal and financial data of over 12,000 individuals. The breach resulted from a sophisticated social engineering attack, leading to data theft and system encryption, though ...

    Read More »
  • UK & US Charge Alleged Scattered Spider Hackers

    UK & US Charge Alleged Scattered Spider Hackers

    Two key members of the Scattered Spider cybercrime group, Thalha Jubair and Owen Flowers, have been arrested and charged in the U.S. and U.K. for their roles in numerous damaging cyber intrusions, including attacks on critical infrastructure and corporate networks. The suspects are accused of usi...

    Read More »
  • 2025's Top Cyber Threats: Ransomware, Outages & AI Attacks

    2025's Top Cyber Threats: Ransomware, Outages & AI Attacks

    The 2025 digital threat landscape is dominated by sophisticated ransomware, third-party vendor disruptions, and AI-driven social engineering campaigns. AI is amplifying social engineering attacks, making them more convincing and accounting for over half of cyber claims and losses in early 2025. R...

    Read More »
  • Malicious npm Code Infiltrated 10% of Cloud Environments

    Malicious npm Code Infiltrated 10% of Cloud Environments

    A supply chain attack using malicious npm packages has compromised about 10% of cloud environments, initiated by a threat actor who hijacked a developer's account to publish trojanized packages. The malicious code, which embedded crypto-stealing malware to intercept and reroute cryptocurrency tra...

    Read More »
  • New Salty2FA Phishing Kit Raises Sophistication Alarm

    New Salty2FA Phishing Kit Raises Sophistication Alarm

    The Salty2FA phishing kit uses advanced tactics like session-based subdomain rotation, legitimate platform abuse, and precise corporate branding to create highly convincing fraudulent login pages. It incorporates Cloudflare’s Turnstile and obfuscated JavaScript to evade automated analysis and com...

    Read More »
  • Insight Partners Notifies Staff, LPs of Data Breach

    Insight Partners Notifies Staff, LPs of Data Breach

    Insight Partners has completed notifying individuals affected by a January data breach that compromised sensitive personal and financial information of limited partners, employees, and details about investment funds and portfolio companies. The breach was identified as a social engineering attack...

    Read More »
  • Boards Must Lead on Cybersecurity: A New Strategic Imperative

    Boards Must Lead on Cybersecurity: A New Strategic Imperative

    Cybersecurity has become a core business priority, requiring board-level leadership in ransomware evolution, cyber-enabled fraud, and security-innovation integration. Ransomware tactics have evolved to target identity systems and help desks, necessitating stronger protections like phishing-resist...

    Read More »
  • Fake macOS Help Sites Spread Shamos Infostealer via ClickFix

    Fake macOS Help Sites Spread Shamos Infostealer via ClickFix

    Cybercriminals are using deceptive help websites and malicious Google ads to trick macOS users into installing the Shamos infostealer malware via harmful Terminal commands. The malware employs the ClickFix social engineering technique to bypass security, collects sensitive data like credentials a...

    Read More »
  • Google Admits Fake Law Enforcement Account in Portal

    Google Admits Fake Law Enforcement Account in Portal

    Google confirmed that cybercriminals created a fake law enforcement account in its Law Enforcement Request System but deactivated it before any data was accessed or requests processed. The breach was claimed by a hacking group linked to known cybercrime organizations, which used social engineerin...

    Read More »
  • Farmers Insurance Data Breach Exposes 1.1M After Salesforce Hack

    Farmers Insurance Data Breach Exposes 1.1M After Salesforce Hack

    A data breach at Farmers Insurance exposed the personal information of over 1.1 million customers due to a third-party vendor incident in May 2025. The breach involved unauthorized access to sensitive data, including names, addresses, driver's license numbers, and partial Social Security details....

    Read More »
  • State Hackers Exploit Most Software Vulnerabilities

    State Hackers Exploit Most Software Vulnerabilities

    State-sponsored hackers were responsible for over half of all attributed software vulnerability exploits in the first half of 2025, primarily targeting critical infrastructure and enterprise systems for espionage rather than financial gain. Chinese state-linked groups dominated these activities, ...

    Read More »
  • 1 in 3 UAE Firms Hit by Spoofing or Deepfakes, Survey Reveals

    1 in 3 UAE Firms Hit by Spoofing or Deepfakes, Survey Reveals

    One in three UAE companies has faced spoofing or deepfake attacks, highlighting a major shift toward sophisticated impersonation tactics as the primary cybersecurity threat. Identity spoofing (36%) and biometric fraud (34%) are now the most common fraud types, with deepfakes used by 35% of firms ...

    Read More »
  • Unmasking FileFix: Steganography & Multistage Payloads Exposed

    Unmasking FileFix: Steganography & Multistage Payloads Exposed

    A cyberattack campaign called FileFix uses steganography to hide malicious code in JPG images, delivered via a phishing site that mimics Meta's support portal. The attack employs advanced techniques like multilingual phishing pages, obfuscated PowerShell scripts, and RC4 decryption to deploy the ...

    Read More »
  • Massive Supply-Chain Attack Hits 2B+ Weekly Downloads

    Massive Supply-Chain Attack Hits 2B+ Weekly Downloads

    A software supply-chain attack compromised nearly two dozen npm packages with two billion weekly downloads, making it one of the most extensive digital infiltrations ever recorded. The breach began when a key maintainer fell for a phishing email, allowing attackers to embed malicious code that hi...

    Read More »
  • Your Digital Footprint: How Geolocation Puts Your Privacy at Risk

    Your Digital Footprint: How Geolocation Puts Your Privacy at Risk

    Geolocation data from smartphones and apps creates a significant privacy risk, enabling cybercriminals to exploit traceable information for targeted attacks. These geofenced threats, like the Stuxnet worm, can remain dormant until reaching specific locations, making early detection difficult and ...

    Read More »
  • Beware: Noodlophile Infostealer Masks as Fake Legal Notices

    Beware: Noodlophile Infostealer Masks as Fake Legal Notices

    A global cyber campaign uses fake legal notices via spear-phishing emails to distribute the Noodlophile infostealer, impersonating law firms to create urgency and steal sensitive data. The malware employs sophisticated techniques like DLL side-loading and disguised malicious files to bypass secur...

    Read More »
  • TransUnion Data Breach Exposes 4.5 Million US Customers

    TransUnion Data Breach Exposes 4.5 Million US Customers

    A data breach at TransUnion compromised the personal information of 4.5 million U.S. individuals, though credit reports and core credit data were not affected. The breach occurred through a third-party application on July 28, 2024, and impacted customers are being offered free credit monitoring a...

    Read More »
  • MacOS Users Targeted by Atomic Stealer Malware on GitHub

    MacOS Users Targeted by Atomic Stealer Malware on GitHub

    A new campaign spreads Atomic Stealer malware by creating fake GitHub repositories that appear to offer legitimate Mac software downloads, tricking users through search engine optimization. The malware is installed via a social engineering trick where users manually run a malicious Terminal comma...

    Read More »
  • Hacker Stole Cisco Customer Data in Voice Phishing Scam

    Hacker Stole Cisco Customer Data in Voice Phishing Scam

    Hackers used a voice phishing (vishing) attack to compromise Cisco's customer data by manipulating an employee into granting unauthorized access to a third-party cloud CRM system. The breach exposed sensitive user information, including names, addresses, email addresses, and account metadata, tho...

    Read More »
  • Insight Partners Hit by Ransomware Attack, Exposing Staff and Investor Data

    Insight Partners Hit by Ransomware Attack, Exposing Staff and Investor Data

    Insight Partners suffered a significant data breach due to a sophisticated cyberattack, compromising personal information of over 12,600 individuals. The stolen data included banking details, tax information, and personal records of employees and limited partners, highlighting vulnerabilities in ...

    Read More »
  • Microsoft, Adobe, SAP Issue Critical September 2025 Patch Tuesday Updates

    Microsoft, Adobe, SAP Issue Critical September 2025 Patch Tuesday Updates

    The September 2025 Patch Tuesday included critical security updates from Microsoft, Adobe, and SAP, addressing numerous vulnerabilities not currently under active exploitation. Microsoft patched over 80 flaws, including a privilege escalation issue in Windows NTLM and a high-risk remote code exec...

    Read More »
  • North Korean Hackers Weaponize Threat Intel for Phishing

    North Korean Hackers Weaponize Threat Intel for Phishing

    North Korea-aligned hackers weaponized cyber threat intelligence platforms to enhance phishing operations, turning defensive tools into offensive weapons. The group Contagious Interview persistently targeted job seekers, especially in cryptocurrency, using fake recruitment sites and malware to ga...

    Read More »
  • Allianz Life Data Breach: 1.1 Million Customers' Data Exposed

    Allianz Life Data Breach: 1.1 Million Customers' Data Exposed

    Allianz Life suffered a cybersecurity breach affecting 1.1 million individuals, compromising sensitive personal data including names, addresses, and Social Security numbers. The attack, attributed to the ShinyHunters group, exploited a cloud-based CRM platform using social engineering and malicio...

    Read More »
  • Microsoft Defender Stops Email Bombing Attacks in Office 365

    Microsoft Defender Stops Email Bombing Attacks in Office 365

    Microsoft Defender for Office 365 now includes automatic detection and blocking of email bombing attacks, protecting organizational inboxes without requiring manual setup. The new 'Mail Bombing' feature, fully deployed by July 2025, diverts suspicious emails to Junk and allows monitoring via Thre...

    Read More »
  • Top Infosec Products of August 2025: Your Ultimate Security Guide

    Top Infosec Products of August 2025: Your Ultimate Security Guide

    Advanced security tools are being released to strengthen defenses, automate responses, and adapt to emerging threats across cloud, endpoint, and identity environments. Innovations include AI-driven analytics, identity governance, and autonomous agents that enhance testing, threat simulation, and ...

    Read More »
  • Jaguar Land Rover Confirms Data Breach After Cyberattack

    Jaguar Land Rover Confirms Data Breach After Cyberattack

    Jaguar Land Rover confirmed a significant data breach and system disruption from a recent cyberattack, leading to temporary shutdowns and affecting its global operations. The company is working with cybersecurity experts to restore systems and has acknowledged that some data was stolen, though sp...

    Read More »