Social Engineering
Psychological Manipulation in Social Engineering: Unveiling the Tactics
Khushboo Chahal | | Awareness, Cyber Security, social engineering, social engineering attacks, threat-simulation
Have you ever found yourself in a situation where you felt like someone was trying to manipulate you into doing something you didn’t want to do? Perhaps it was a friend, family ...
China Breaches Microsoft Cloud — Spied on US Govt. Email
Richi Jennings | | Active Directory, Authentication, Azure Active Directory, Azure AD, Exchange, Microsoft, Outlook.com, SB Blogwatch, Storm-0558
Storm-0558 Brewing: Multiple Microsoft failures cause data leaks at State and Commerce depts., plus 23 other orgs ...
Security Boulevard
Special report: Fighting fraud in the age of AI and automation
Kathryn Schneider | | AI, Artificial Intelligence, Bots, bots-as-a-service, Data & Insights, democratization of fraud, Digital Trust & Safety, Digital Trust and Safety, fraud prevention, fraud-as-a-service, social engineering
See findings from Sift’s Q2 2023 Digital Trust & Safety Index, which includes data and insights on how AI and automation are changing the scope of fraud. The post Special report: Fighting ...
Vishing: Breaking Down Social Engineering Techniques
Social-Engineer | | artificial time constraint, authority, Liking, Newsletter, reciprocity, social engineering, social engineering techniques, Social-proof, vishing
If you’ve read our past joint newsletter, you know that Curt and I (Shelby) approach vishing in a way that […] ...
‘Wagner Mercenary’ Hackers Destroy Russian Satellite Comms
Richi Jennings | | Dozor-Teleport, false flag, Russia, Russia-Ukraine, russia-ukraine conflict, Russia's War on Ukraine, Satellite Attacks, Satellite Communications, Satellite Hacking, Satellites, SB Blogwatch, Ukraine, ukraine conflict, Ukraine Cyber War, Ukraine cyberattack, Ukraine-Russia War
Dozor-Teleport hack, vandalism and data breach. But is it a Ukrainian false flag op? ...
Security Boulevard
A Guide to Articulating Risk: Speaking the Language of the Stakeholder
The role of the modern CISO today is just as much about managing technical solutions as it is about communicating risk to key decision-making stakeholders. In their daily roles, most C-suite executives ...
Security Boulevard
Ironic: LetMeSpy Spyware Hackers Were Hacked (by Hackers)
Richi Jennings | | android spyware, cyberstalking, Data breach, Data Leaks, iOS spyware, LetMeSpy, maia arson crimew, Malware Spyware, Parental Control, parental controls, Privacy, SB Blogwatch, spyware, Stalkerware, Stalking, Stalkware
Content warning: Abuse, stalking, controlling behavior, Schadenfreude, irony, doxxing ...
Security Boulevard
Sowing Chaos and Reaping Rewards in Confluence and Jira
IntroductionLet me paint a picture for you. You’re on a red team operation, operating from your favorite C2, and have just landed on a user’s workstation. You decide to take a look ...
Today’s cybersecurity health checks must identify AI based threats. Does yours?
Barry Strauss | | AI, artificial intellignece, bec, business email compromise, ChatGPT, credential stealing, Email Protection, FBI, generative AI, human, Malware, Microsoft Outlook, Mobile Phishing, observability, Phishing, smishing, SMS, social engineering, spear-phishing, Threat Intelligence, vishing
Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
Apple Fixes 0-Days — Russia Says US Used for Spying
Richi Jennings | | Apple, CVE-2023-32434, CVE-2023-32439, FSB, imessage, ios, kaspersky, Kaspersky Lab, Kaspersky Security, nsa, Russia, Russian FSB, SB Blogwatch, TriangleDB, triangulation
Vulns unpatched for FOUR years: ‘Triangulation’ spyware said to use backdoor Apple gave to NSA ...
Security Boulevard