Remove Phishing Remove Social Engineering Remove Telecommunications
article thumbnail

What are Common Types of Social Engineering Attacks?

eSecurity Planet

Social engineering is a common technique that cybercriminals use to lure their victims into a false sense of security. As social engineering tactics become more advanced, it’s important to know how to identify them in the context of cybersecurity. Social engineering in cybersecurity attacks.

article thumbnail

Voice Phishers Targeting Corporate VPNs

Krebs on Security

The COVID-19 epidemic has brought a wave of email phishing attacks that try to trick work-at-home employees into giving away credentials needed to remotely access their employers’ networks. For now at least, they appear to be focusing primarily on companies in the financial, telecommunications and social media industries.

Phishing 363
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sprint Exposed Customer Support Site to Web

Krebs on Security

This sort of information would no doubt be of interest to scammers seeking to conduct social engineering attacks against Sprint employees as way to perpetrate other types of fraud, including unauthorized SIM swaps or in gleaning more account information from targeted customers.

article thumbnail

Security Affairs newsletter Round 500 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

article thumbnail

Octo Tempest cybercriminal group is "a growing concern"—Microsoft

Malwarebytes

Octo Tempest is believed to be a group of native English speaking cybercriminals that uses social engineering campaigns to compromise organizations all over the world. This can be done in a number of ways, but the most common ones involve social engineering attacks on the victim's carrier.

article thumbnail

Iran-Linked APT TA450 embeds malicious links in PDF attachments

Security Affairs

Proofpoint researchers observed the Iran-linked APT group MuddyWater (aka SeedWorm , TEMP.Zagros , TA450, and Static Kitten ) was behind a new phishing campaign in March 2024 that attempted to drop a legitimate Remote Monitoring and Management (RMM) solution called Atera on the target systems.

Phishing 138
article thumbnail

Iran-linked Chafer APT group targets governments in Kuwait and Saudi Arabia

Security Affairs

The APT group targets telecommunication and travel industries in the Middle East to gather intelligence on Iran’s geopolitical interests. The Chafer APT group has distributed data stealer malware since at least mid-2014, it was focused on surveillance operations and the tracking of individuals. ” continues the report.