Bumblebee Malware Distributed via WeTransfer or Smash
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.
Threat Advisory: Attackers are using file-sharing services like Smash or WeTransfer to deliver Bumblebee malware disguised as RFPs.
Spear phishing at scale: A new era of AI fueled attacks where social engineering, social media, AI tools, and micro-targeting converge.
This post shares a few highly effective social engineering examples using micro-targeting techniques based on LinkedIn profile attributes.
From novice hackers to complex cybercriminal networks, see how attackers build detailed profiles of their social engineering attack targets.
Phishing remains a top cyber threat. Sophisticated scams are very easy to execute and highly profitable. Here are the top phishing trends in 2020 to watch.
Ransomware is so 2017. Today, targeted phishing poses the most significant risk. But how did we get here and what’s next for AI-based Phishing Detection.
The Magnitude of the Breach On Thursday, June 4, it was announced that there was a large breach of the Office of Personnel Management (OPM) of the federal government. The Chinese are fingered in the breach, in which about 4 million people’s records were lost in the attack, and the Chinese government denied being responsible,…