Social Engineering
Latest about Social Engineering

Webinar: Foster high-quality embedded software development
By ITPro published
whitepaper Discover the latest trends and pain points of platform engineering in embedded software

Platform engineering 2024: Fostering high-quality embedded software development
By ITPro published
whitepaper Enhance your organization’s platform engineering strategy

How do hackers get your passwords?
By Dale Walker last updated
In-depth Knowing how hackers get passwords, or at least the most common methods used, could help you keep yours safe from predatory cyber criminals

Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week
By Richard Speed published
News Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets

Malware being pushed to businesses by search engines remains a pervasive threat
By Ross Kelly published
News High-profile malvertising campaigns in recent months have surged

Novel social engineering attacks soar 135% amid uptake of generative AI
By Zach Marzouk published
News 82% of employees are worried about hackers using generative AI to create scam emails

CISA: Phishing campaign targeting US federal agencies went undetected for months
By Rory Bathgate published
News Threat actors used legitimate remote access software to maliciously target federal employees

Google Ads malvertising campaign prompts questions around Search security
By Rory Bathgate published
News A leading security researcher has called into question why Google still allows malware links to top search results
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.