Tag: Social Engineering
-
Assessing the Y, and How, of the XZ Utils incident
In this article we analyze social engineering aspects of the XZ backdoor incident. Namely pressuring the XZ maintainer to pass on the …
-
Appdome launches Social Engineering Prevention service to safeguard mobile users
Appdome has unveiled its new Social Engineering Prevention service on the Appdome platform. The new service enables mobile brands to …
-
Panel: Physical Security and Social Engineering – PSW #817
In this segment, we discuss topics related to physical security and social engineering. We also touch on the challenges and strategies for …
-
MGM and Caesars Attacks Highlight Social Engineering Risks
Relying on passwords to secure user accounts is a gamble that never pays …
-
The People Hacker: AI a Game-Changer in Social Engineering Attacks
Cybercriminals are using artificial intelligence (AI) to launch more sophisticated social engineering attacks, and experts are warning that …
-
The link between home, family and company security
It’s no surprise that cyber criminals target high-profile individuals or those with access privilege. Malicious actors often use social …
-
Spend to save: The CFO’s guide to cybersecurity investment
Attack volumes are up, and attackers are finding new ways to compromise corporate security. According to the HackerOne 6th Annual …
-
Social Engineering Adds Depth to Red Team Exercises
Because social engineering usually succeeds, companies need to test whether their defenses can block adversaries that gain employees’ …
-
Analysis: Social Engineering Drives BEC Losses to $50B Globally
Threat actors have grown increasingly sophisticated in applying social engineering tactics against their victims, which is key to this …
-
Offbeat Social Engineering Tricks in a Scammer’s Handbook
Contrary to stereotype, today’s cyberattacks aren’t limited to complex tactics such as the use of zero-day exploits or polymorphic …
-
Social Engineering Risks Found in Microsoft Teams
Several new ways of effectively abusing Microsoft Teams via social engineering have been discovered by security researchers at Proofpoint. …
-
Social Engineering: Definition & 5 Attack Types
We all know about the attacker who leverages their technical expertise to infiltrate protected computer systems and compromise sensitive …
{"loadingDistance":1200,"stickyPosts":[],"nextPageLink":"https://itts.at/archives/tag/social-engineering/page/2","queryId":2}
●●●