impersonation

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps
Stephen Kowski | | credential harvesting, Email Protection, generative AI, impersonation, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing pages, phishing threats, social engineering, Threat Intelligence
Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...

Is That Really ProtonMail? New Credential Harvesting Threats Targeting Cloud Apps
Stephen Kowski | | credential harvesting, Email Protection, generative AI, impersonation, Link Phishing, Phishing, Phishing Attacks, phishing defense, phishing pages, phishing threats, social engineering, Threat Intelligence
Imagine sipping your morning coffee, scrolling through your inbox, when a seemingly innocent ProtonMail message catches your eye. But this isn’t your typical email—it’s a credential-harvesting attempt targeting specific cloud services. Today, ...

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust
Stephen Kowski | | CTO Corner, DocuSign, Email Protection, Fraud, government attack, impersonation, social engineering, spoofing
The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...

Socially Engineered Into Stealing $500,000 From a Casino
A cashier at a Colorado casino is accused of stealing half a million dollars in cash after allegedly being duped by phone calls and text messages from imposters posing as her bosses ...
Security Boulevard

Lessons from a Scam Artist
Social-Engineer | | General Social Engineer Blog, how do scammers use social engineering, impersonation, Lessons from a scam artist, Phishing, smishing, social engineering, techniques scammers use, vishing
What does a government scam, an IT support scam and a romance scam have in common? They all use psychology […] ...
A Device to Turn Traffic Lights Green
Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green. As mentioned earlier, the Flipper Zero has a ...
Defending against AI Lobbyists
When is it time to start worrying about artificial intelligence interfering in our democracy? Maybe when an AI writes a letter to The New York Times opposing the regulation of its own ...

Social Engineering and Healthcare
Social-Engineer | | Cybersecurity, Cybersecurity Training, impersonation, Infosec, Newsletter, Phishing, smishing, social engineering and healthcare, vishing
Social engineering has become a larger threat to the healthcare industry in recent years. So much so that the Federal […] ...

Three key variables you need to optimize for a successful phishing simulation program
Scott | | backlash, Creating Active Awareness, difficulty, Employee Awareness, frequency, Home, impersonation, Phishing, Phishing assessments, phishing exercises, phishing simulations, phishing tests, Security Awareness, Security Culture, tips
The post Three key variables you need to optimize for a successful phishing simulation program appeared first on Click Armor ...
Obligatory ChatGPT Post
Seems like absolutely everyone everywhere is playing with Chat GPT. So I did, too…. Write an essay in the style of Bruce Schneier on how ChatGPT will affect cybersecurity. As with any ...