Social Engineering
-
Hackers are using Zoom’s remote control feature to infect devices with malware
News Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices.
By Ross Kelly Published
News -
State-sponsored cyber groups are flocking to the 'ClickFix' social engineering technique
News State-sponsored hackers from North Korea, Iran, and Russia are exploiting the ‘ClickFix’ social engineering technique for the first time – and to great success.
By Emma Woollacott Published
News -
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.
By Jane McCallion Published
-
Why LinkedIn has become a prime hunting ground for cyber criminals
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.
By Solomon Klappholz Published
News -
Phishing campaign targets developers with fake CrowdStrike job offers
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike
By Solomon Klappholz Published
News -
Intranet and employee experience platforms
whitepaper Reviews of the best products on the market
By ITPro Published
whitepaper -
Webinar: Foster high-quality embedded software development
whitepaper Discover the latest trends and pain points of platform engineering in embedded software
By ITPro Published
whitepaper -
Platform engineering 2024: Fostering high-quality embedded software development
whitepaper Enhance your organization’s platform engineering strategy
By ITPro Published
whitepaper -
How do hackers get your passwords?
In-depth Knowing how hackers get passwords, or at least the most common methods used, could help you keep yours safe from predatory cyber criminals
By Dale Walker Last updated
In-depth -
Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week
News Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets
By Richard Speed Published
News -
Malware being pushed to businesses by search engines remains a pervasive threat
News High-profile malvertising campaigns in recent months have surged
By Ross Kelly Published
News -
Novel social engineering attacks soar 135% amid uptake of generative AI
News 82% of employees are worried about hackers using generative AI to create scam emails
By Zach Marzouk Published
News