Remove InfoSec Remove Scams Remove Social Engineering
article thumbnail

ChatGPT: What are the Implications for Infosec?

SecureWorld News

The ability to ask any question on just about any topic and have a very intelligent answer given has cybersecurity experts wondering if the infosec community is using it and, if so, for what; and, if so, how is it working for writing scripts and code or imitating phishing emails, for instance. The script to do that was written by ChatGPT.

InfoSec 145
article thumbnail

Beg Bounties

Troy Hunt

Of course, he took the bait: pic.twitter.com/epM9YTSz1L — Troy Hunt (@troyhunt) November 6, 2021 It's like dealing with scam phone calls: if you want to see where they lead, you need to play the game and not come on too strong too early. Onto the "scammer" comment and it raises an interesting question: is this a scam?

Scams 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. One of our jobs is to make sure the brand stays true to its zeitgeist, its character, and [Infosec] really had it down right from the beginning.”. What do you do?

article thumbnail

Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack

Security Boulevard

A phone scam targeting psychologists reveals that even professionals can become victims, stolen multi-million-dollar NFT’s results in a “all my apes gone” plea for help, and details on a skimmer supply chain attack on more than 100 real estate websites. ** Links mentioned on the show ** The Phone Scam That Targets Psychologists [link] Thieves […].

Scams 104
article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

I seem to be doing most of that activity now on Mastodon , which appears to have absorbed most of the infosec refugees from Twitter, and in any case is proving to be a far more useful, civil and constructive place to post such things. com, which was fed by pig butchering scams.

article thumbnail

Personal Cybersecurity Concerns for 2023

Security Through Education

Impersonation Scams. These range from simple to sophisticated scams to convince you they are genuine, in hopes that you feel comfortable sharing personal or financial information whether on the phone, via email, or text. Although BEC attacks may be targeted at business, they can also be used to scam individual people.

article thumbnail

Scattered Spider x RansomHub: A New Partnership

Digital Shadows

The attacker gained initial access to two employee accounts by carrying out social engineering attacks on the organization’s help desk twice. Leveraging its English proficiency, the collective uses social engineering for initial access. Within six hours, the attacker began encrypting the organization’s systems.