Remove Cybercrime Remove Social Engineering Remove Threat Detection
article thumbnail

The Impact of AI on Social Engineering Cyber Attacks

SecureWorld News

Social engineering attacks have long been a threat to businesses worldwide, statistically comprising roughly 98% of cyberattacks worldwide. Given the much more psychologically focused and methodical ways that social engineering attacks can be conducted, it makes spotting them hard to do.

article thumbnail

MUT-1244 Campaign Steals Hundreds of Thousands of WordPress Credentials and More

SecureWorld News

Researchers at Datadog Security Labs have uncovered a year-long, large-scale cybercrime campaign by a threat actor tracked as MUT-1244. This operation, which blends social engineering and technical exploitation, has resulted in the theft of more than 390,000 WordPress credentials.

Phishing 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

The hackers rely heavily on social engineering tactics to distribute the malware. Education on verifying app downloads, MFA, advanced threat detection, encrypted communications, and tighter mobile device management controls can all contribute to protecting users.

article thumbnail

Research Examines WormGPT, an AI Cybercrime Tool Used in BEC Attacks

SecureWorld News

In its latest research , SlashNext—a provider of multi-channel phishing and human hacking solutions—delves into the emerging use of generative AI, including OpenAI's ChatGPT, and the cybercrime tool WormGPT, in Business Email Compromise (BEC) attacks. Urgency is a key emotion that social engineers prey upon to induce actions."

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

Organizations should likewise leverage GenAI to better detect AI-enhanced threats and counter the attack volumes that we expect to see in 2024. They’ll make adept use of social engineering, leverage insider knowledge of systems and workflows and exploit weak cloud configurations and porly implemented multi-factor authentication.

article thumbnail

Road Tolls Scams Rise on FBI's Radar; Public Warned Against Smishing

SecureWorld News

The rise of these sophisticated road toll scams is catching many people off guard, highlighting the evolving nature of cybercrime. The sheer volumewith over 10,000 registered fake domains impersonating toll services across at least 10 statesshows how sophisticated and widespread this threat has become.

Scams 91
article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

The report explores major findings and this year it put a spotlight on the complexity of the cybersecurity landscape, which is intensified by geopolitical tensions, emerging technologies, supply chain interdependencies, and cybercrime sophistication. Nation-states and geopolitical tensions are increasingly fuelling modern cyber threats.