social engineering attacks

How Brand Protection Can Address the Risk of GAN Deepfakes
Deepfakes are a concept that has taken root in popular culture. Most deepfakes are benign; the good ones go viral and can often make us laugh. But in the very near future, ...
Security Boulevard

Fall for Phishing? You Could Get Fired
One in four employees lost their job in the last 12 months after making a mistake that compromised their company’s security, according to a report from email security company Tessian. While the ...
Security Boulevard

Cybercriminals Using QR Codes to Steal Financial Info, FBI Warns
Nathan Eddy | | cryptocurrency, cybercriminals, Mobile Security, QR code, social engineering attacks
Cybercriminals are tampering with quick response (QR) codes to redirect victims to malicious sites that steal login and financial information, the FBI warned in an alert published last week. QR codes are ...
Security Boulevard

Cybercrime: Rising Concern to Cyber World
Kumar Shantanu | | Cyber Security, cybercrime, cybercriminals, cybersecurity breach, social engineering attacks, ThreatCop
As per an article by The Hindu, 50,035 cases of cybercrime were reported in 2020, 11.8% more than in 2019 while 60.2% of cybercrimes were of fraud. Every organization or institution has ...

Propaganda as a Social Engineering Tool
Sue Poremba | | Deep Fake, disinformation, fake news, Misinformation, Phishing, social engineering attacks
Remember WYSIWYG? What you see is what you get. That was a simpler time in technology; you knew what the end result would be during the development stage. There were no surprises ...
Security Boulevard
Stopping Sophisticated Social Engineering Scams – Looking Beyond the Basic Signs
sln_admin | | Phishing, phishing defense, phishing threat intelligence, real time phishing threat intelligence, social engineering, social engineering attacks, social engineering scams
Most social engineering attack signs are really indicators for basic attacks from less experienced and sophisticated hackers. Today’s attacks are more sophisticated ...

Threat Discovery: Attackers are Abusing Adobe Open Redirect Service to Serve Phishing
Lisa O'Reilly | | Phishing, phishing defense, phishing site, phishing threat, phishing URL, real time phishing threat intelligence, social engineering attacks, targeted phishing defense
As we’ve blogged about before, cybercriminals are increasingly leveraging legitimate commercial infrastructure sites to […] ...
The Threat Detection Deficit – Microsoft Office 365 ATP Raises the Stakes
Lisa O'Reilly | | APT, Phishing, Phishing Attacks, phishing threat detection, phishing URL, phishing URL analysis, real time phishing threat intelligence, social engineering attacks, threat detection
A recent Dark Reading article, based on IRONSCALES’ research, found that Microsoft Office 365 […] ...
How to Protect Your Employees When Threat Actors Leverage Legitimate Infrastructure
Lisa O'Reilly | | Phishing Attacks, phishing emails, real time phishing threat intelligence, social engineering attacks, targeted phishing defense, Threat Intelligence, URL filtering, URL filtering tools
In a recent blog we discussed Why Organizations Need to Take Phishing Threats Against […] ...
4 Infamous Social Engineering Attacks That Real-Time Protection Would Have Stopped
Lisa O'Reilly | | Phishing, Phishing Attacks, phishing threats, phishing URL, real time phishing threat intelligence, social engineering attacks, Zero-hour phishing threats
Threat actors are constantly evolving their methods to go after the human attack surface […] ...