Last year, we documented a new social engineering toolkit we called “Domen” being used in the wild. Threat actors were using…
Tag: Social Engineering
Spear phishing 101: what you need to know
Phishing, a cyberattack method as old as viruses and Nigerian Princes, continues to be one of the most popular means of…
WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation
Update [01-27-2020]: Shortly after this blog was published we noticed that a large part of the infrastructure behind this browlock was…
6 ways hackers are targeting retail businesses
Retail hacking is no new phenomenon, although it has increased in frequency over the last few years. In fact, retailers experienced…
Spelevo exploit kit debuts new social engineering trick
2019 has been a busy year for exploit kits, despite the fact that they haven’t been considered a potent threat vector…
Fake Elder Scrolls Online developers go phishing on PlayStation
A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via Playstation…
Deepfakes and LinkedIn: malign interference campaigns
Deepfakes haven’t quite lost the power to surprise, but given their wholesale media saturation in the last year or so, there’s…
Not us, YOU: vendor email compromise explained
Silent Starling, an online organized criminal group hailing from West Africa, seem to have reminded SMBs and enterprises alike the perils…
Help prevent disaster donation scams from causing more misery
It’s a sad day when we have to warn people about medical charity scams, or tax fakeouts, or even have a…
How to protect yourself from doxing
“Abandon hope all ye who enter.” This ominous inscription affixed atop the gates to Hell in Dante’s Divine Comedy applies peculiarly…