Results for 'social engineering'
Twilio breached after social engineering attack on employees
August 9, 2022 - Cloud-based communication platform provider Twilio has announced a breach via a social engineering attack on employees. On August 4, 2022, Twilio says...
FIFA 22 phishers tackle customer support with social engineering
January 12, 2022 - Players of smash hit gaming title FIFA 22 have become the target of a wave of attacks focused on account compromise....
SBA phishing scams: from malware to advanced social engineering
August 10, 2020 - A number of threat actors continue to take advantage of the ongoing coronavirus pandemic through phishing scams and other campaigns distributing...
Spelevo exploit kit debuts new social engineering trick
December 18, 2019 - 2019 has been a busy year for exploit kits, despite the fact that they haven’t been considered a potent threat vector...
New social engineering toolkit draws inspiration from previous web campaigns
September 3, 2019 - Some of the most common web threats we track have a social engineering component. Perhaps the more popular ones are those...
Social engineering attacks: What makes you susceptible?
August 2, 2018 - We now live in a world where holding the door open for someone balancing a tray of steaming hot coffee—she can’t...
Disdain exploit kit and a side of social engineering deliver Neutrino Bot
November 9, 2017 - Today we picked up new activity from an exploit kit that was first discovered back in August of this year. The...
New social engineering scheme triggers on mouse movement
June 8, 2017 - One of threat actors’ favorite malware delivery schemes is social engineering as it remains highly effective against a variety of targets....
Hacking your head: how cybercriminals use social engineering
January 20, 2016 - Social engineering is nothing new. It’s a tool of psychological manipulation that’s been used since the dawn of man. Why? To...
Patching the End User: How to Recognize the Social Engineering In Scams
June 11, 2013 - Scammers use psychological manipulation to defraud their victims, so it is extremely useful to be able to identify the social engineering elements...