Social Engineering
-
Russian hackers tried to lure diplomats with wine tasting
News The Midnight Blizzard threat group has been targeting European diplomats with malicious emails offering an invite to wine tasting events, according to Check Point.
By Ross Kelly Published
News -
This hacker group is posing as IT helpdesk workers to target enterprises
News The Luna Moth hacker group is ramping up attacks on firms across a range of industries with its 'callback phishing' campaign, according to security researchers.
By Emma Woollacott Published
News -
Hackers are using Zoom’s remote control feature to infect devices with malware
News Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices.
By Ross Kelly Published
News -
State-sponsored cyber groups are flocking to the 'ClickFix' social engineering technique
News State-sponsored hackers from North Korea, Iran, and Russia are exploiting the ‘ClickFix’ social engineering technique for the first time – and to great success.
By Emma Woollacott Published
News -
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.
By Jane McCallion Published
-
Why LinkedIn has become a prime hunting ground for cyber criminals
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.
By Solomon Klappholz Published
News -
Phishing campaign targets developers with fake CrowdStrike job offers
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike
By Solomon Klappholz Published
News -
Intranet and employee experience platforms
whitepaper Reviews of the best products on the market
By ITPro Published
whitepaper -
Webinar: Foster high-quality embedded software development
whitepaper Discover the latest trends and pain points of platform engineering in embedded software
By ITPro Published
whitepaper -
Platform engineering 2024: Fostering high-quality embedded software development
whitepaper Enhance your organization’s platform engineering strategy
By ITPro Published
whitepaper -
How do hackers get your passwords?
In-depth Knowing how hackers get passwords, or at least the most common methods used, could help you keep yours safe from predatory cyber criminals
By Dale Walker Last updated
In-depth -
Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week
News Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets
By Richard Speed Published
News