Social Engineering

Social Engineering

GitHub satellite cyberattack Strontium cyberwarfare counter-drone The Legality of Waging War in Cyberspace

GitHub Developers Targeted by North Korea’s Lazarus Group

The Lazarus Group is behind a social engineering campaign that uses repository invitations and malicious npm packages to target developers on GitHub ...
Security Boulevard
Kevin Mitnick

R.I.P. Kevin Mitnick, 1963–2023

Kevin is Free: Hackers’ hacker dies, aged 59 ...
Security Boulevard
QR codes ransomware, attacks, RaaS, SlashNext ransomware phishing attack

The Rise of QR Codes Spurs Rise in ‘Fresh Phish’

Miscreants have ramped up their use of QR codes to phish for credentials, according to INKY threat researchers ...
Security Boulevard
Biden Admin. Adds ‘Mercenary Spyware’ Firms to Ban List

Biden Admin. Adds ‘Mercenary Spyware’ Firms to Ban List

European cousins Intellexa and Cytrox essentially banned by Commerce Dept. — Predator/ALIEN not welcome in U.S ...
Security Boulevard
Microsoft ransomware AWS Spring4Shell flaws vulnerabilities WhiteSource Python

CISA to Gov’t Agencies: Mitigate a Flaw in Windows and Office

The U.S. government is giving federal agencies three weeks to mitigate a zero-day Microsoft Windows and Office security flaw exploited by the Russian-linked RomCom threat group ...
Security Boulevard
email cyber, resilience, Dell Lacework Adds Time Series Modeling to Cybersecurity Platform

A Look at the Email Threat Landscape in Q1 2023

VIPRE's Email Threat Trends Report for Q1 2023 analyzed 1.8 billion emails to provide a comprehensive understanding of contemporary email threats ...
Security Boulevard
GPT OpenSSF AI ML Darktrace Concentric supply chain Palo Alto AI partnership ai

The Two Faces of AI in Identity Management

The advent of AI made identity the most-targeted part of the attack surface. But without AI, identity is a sitting duck ...
Security Boulevard
OPSEC FAIL: US Military Email Going to Mali — via Typo

OPSEC FAIL: US Military Email Going to Mali — via Typo

MX Mixup: Russian-allied government can intercept “highly sensitive information”—because there’s no “I” in .ML ...
Security Boulevard
SlashNext BEC phishing

SlashNext Report Shows How Cybercriminals Use Generative AI

A SlashNext report detailed how cybercriminals use generative AI capabilities to launch phishing and BEC attacks in greater volume ...
Security Boulevard