News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Free online AI tool identifies social engineering  
Free AI online tool identifies social engineering - AI MS

Social engineering also threatens many employees in companies. The new Bitdefender chatbot service Scamio uses a powerful AI service to detect and verify online fraud attempts across email, text messages, messaging apps and social media. Bitdefender has introduced Scamio, a free service to detect attempted scams. The service is intended to help users verify fraudulent online offers via email, embedded links, text and instant messaging by working with a chatbot based on artificial intelligence. Detecting Social Engineering with Scamio The extent of online fraud continues to increase every year. A report from the Federal Trade Commission…

Read more

Cyber ​​risk Social engineering challenges companies
Cyber ​​risk Social engineering challenges companies

Social engineering is a major security risk. Cybercriminals steal credentials from individuals via mobile phishing attacks and infiltrate company infrastructure. Using personal mobile devices for work creates a major gap in security visibility. Security teams in companies are currently facing various challenges when it comes to threat monitoring, i.e. monitoring possible threats. Sascha Spangenberg, Global MSSP Solutions Architect at Lookout, explains the recent changes in attacker behavior: In the past, attackers have attempted to gain access to the infrastructure directly through vulnerabilities or using brute force methods. These attacks are…

Read more

QR Codes and Phishing: Quishing Attacks
B2B Cyber ​​Security ShortNews

How cybercriminals abuse QR codes for phishing. The use of technology is constantly evolving to make personal and professional lives more convenient, as evidenced by the quick response code. For example, this two-dimensional barcode allows users to quickly and easily share website URLs and contact information or make payments. However, this technology has also opened up new opportunities for cybercriminals. QR code phishing attacks, also known as quishing, are on the rise and pose a significant threat to users and businesses alike. QR codes for email attacks Hackers are using QR codes in email attacks, to trick recipients into visiting malicious websites…

Read more

The most dangerous attack method: social engineering
The most dangerous attack method: social engineering

According to Verizon's Data Breach Investigations Report, 74% of security breaches are the result of successful social engineering attacks, bugs, abuse, and other human weaknesses. Also in many companies. A little good news: In the previous year, 82 percent of security breaches were recorded. But 74 percent remain social engineering attacks, according to Verizon's Data Breach Investigations report. The most successful attack method with 50 percent is pretexting, i.e. a social engineering activity with a specific pretext as the trigger. This is a double increase compared to last year. Phishing, phishing, phishing pretexting is...

Read more

How to Avoid MFA Fatigue Attacks?
How to Avoid MFA Fatigue Attacks?

Phishing attacks are currently one of the greatest cyber threats. New variants can be observed almost every day. At the moment, there are more and more MFA fatigue attacks, as the hacker attack on the transport service provider Uber shows. CyberArk Labs have identified five common recent phishing attacks: MFA Fatigue Attacks Using SMS and voice phishing to impersonate trusted sources, attackers “tire” users with multiple MFA pushes before gaining access to the target systems. Attackers are always finding new ways to bypass MFA applications and security controls. The use of phishing-resistant MFA factors such as FIDO, QR codes or…

Read more

Computer game: it's so easy for employees to fall into the social engineering trap
G Data News

The G DATA academy is expanding its portfolio with an interactive game on the topics of social engineering traps, ransomware and phishing. With this, G DATA is reacting to the increasing need for accompanying measures in security awareness training courses in order to increase the completion rates for e-learning courses. More and more companies are using security awareness training to arm their staff for phishing attempts or a social engineering trap. However, employees often lack the motivation to complete the courses. An interactive game from the G DATA academy provides the right incentive to learn. Computer game as awareness training The computer game is available…

Read more

Fake Vanity URLs on Zoom and Google
B2B Cyber ​​Security ShortNews

URL spoofing enables targeted social engineering attacks. Varonis warns against fake vanity URLs on Zoom and Google. Varonis Threat Labs have discovered vulnerabilities in Zoom, Box and Google Docs that allow cybercriminals to easily forge invite URLs. As a result, phishing links appear trustworthy even for trained employees, which significantly increases the likelihood of a successful attack: If they click on the link of their supposed employer, customer or partner, they will be taken to a phishing page that looks authentic and where they can be found should reveal sensitive data such as passwords and personal information. Depending on the social engineering technique, this information appears to users...

Read more

Analytics for social engineering attacks
Social engineering attacks

In the case of social engineering attacks, analytics can identify much more quickly and minimize damage. Training and security tools alone are not enough. Analytics can complete a defense strategy against social engineering. Social engineering has always been a major threat to every internet user, both as an individual or as part of a company. Cyber ​​criminals know that humans are the weakest link in the security chain and are increasingly relying on social engineering attacks to compromise systems and networks and gain access to sensitive data. In contrast to machines and security software, we humans tend to misjudge and ...

Read more