article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

A sophisticated form of mobile malware dubbed "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. The hackers rely heavily on social engineering tactics to distribute the malware.

article thumbnail

Threat Detection Software: A Deep Dive

CyberSecurity Insiders

As the threat landscape evolves and multiplies with more advanced attacks than ever, defending against these modern cyber threats is a monumental challenge for almost any. Threat detection is about an organization’s ability to accurately identify threats, be it to. on your systems, threat detection is impossible.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Make Threat Detection Better?

Anton on Security

I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Cloud authentication logs?) Can We Have “Detection as Code”?” Application traces?

article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

One piece of evidence to support this hypothesis is the low adoption of a basic security control that protects against identity-based attacks - multi-factor authentication (MFA). Add to this, the risks of weak authentication factors such as SMS one-time passcodes and dormant or inactive accounts.

article thumbnail

The Impact of AI on Social Engineering Cyber Attacks

SecureWorld News

Social engineering attacks have long been a threat to businesses worldwide, statistically comprising roughly 98% of cyberattacks worldwide. Given the much more psychologically focused and methodical ways that social engineering attacks can be conducted, it makes spotting them hard to do.

article thumbnail

How to Make Threat Detection Better?

Security Boulevard

I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Here, I want to continue the conversation on detection quality. Cloud authentication logs?). Related blog posts: “Modern Threat Detection at Google” (ep17).

article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

And one of the most successful and increasingly prevalent ways of attack has come from social engineering, which is when criminals manipulate humans directly to gain access to confidential information. Social engineering is more sophisticated than ever, and its most advanced iteration is the topic of today's discussion: deepfakes.