vishing
GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services
Fraudsters redirected email and web traffic destined for several cryptocurrency trading platforms over the past week. The attacks were facilitated by scams targeting employees at GoDaddy, the world's largest domain name registrar, ...
Dealing with Guilt as a Social Engineer
Are you new to the field of social engineering? Or does this career interest you? If so, dealing with guilt as a social engineer will be something you will need ...
Two Charged in SIM Swapping, Vishing Scams
Two young men from the eastern United States have been hit with identity theft and conspiracy charges for allegedly stealing bitcoin and social media accounts by tricking employees at wireless phone companies ...
The Danny Ocean of Social Engineer’s
In This Issue, "The Danny Ocean of Social Engineer's." Shelby Dacko, Human Risk Analyst with Social‐Engineer, LLC., shares her story of entering the field of professional social engineering. The post The Danny ...
#BeCyberSmart: Protect Your Cyberspace
In This Issue, "#BeCyberSmart: Protect Your Cyberspace". Whether it’s protecting your personal network and devices, your virtual workspace, or classroom, find out how you can #BeCyberSmart. The post #BeCyberSmart: Protect Your Cyberspace ...
FBI, CISA Echo Warnings on ‘Vishing’ Threat
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued a joint alert to warn about the growing threat from voice phishing or "vishing" attacks ...
Voice Phishers Targeting Corporate VPNs
The COVID-19 epidemic has brought a wave of email phishing attacks that try to trick work-at-home employees into giving away credentials needed to remotely access their employers' networks. But one increasingly brazen ...
Managing Your Vishing Defenses at Home
During the past 6 years at Social-Engineer, LLC (SECOM) we’ve made over 45,000 calls to companies all over the world. Banks, startups, tech firms, pharmaceutical companies, defense contractors, and many other organizations ...
Order Out of Chaos: Tackling Phishing Attacks
Sometimes the old ways are the most effective. While black hat artificial intelligence and 5G threats grab the headlines, phishing remains the top challenge for global organizations. Like all good cybersecurity, there’s ...
Deepfakes: How to Defend Yourself from Attack
Deepfake attacks - anyone who has a presence on social media is vulnerable. Find out how you can defend yourself and your company against them in latest blog, "Deepfakes: How to Defend ...

