article thumbnail

5 social engineering assumptions that are wrong

CSO Magazine

Social engineering is involved in the vast majority of cyberattacks, but a new report from Proofpoint has revealed five common social engineering assumptions that are not only wrong but are repeatedly subverted by malicious actors in their attacks.

article thumbnail

Microsoft reports jump in business email compromise activity

CSO Magazine

BEC attacks stand apart in the cybercrime industry for their emphasis on social engineering and the art of deception,” said Vasu Jakkal, corporate vice president of security, in a blog post. Successful BEC attacks cost organizations hundreds of millions of dollars annually.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korean threat actor APT43 pivots back to strategic cyberespionage

CSO Magazine

However, another team that security researchers call APT43, Kimsuky, or Thallium has been carrying out cyberespionage and cybercrime operations at the behest of the North Korean government since at least 2018.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

His expertise is in social engineering, technology, security algorithms and business. Moore’s research topics are dedicated to the ongoing progression of cyber law, cybercrime, national and international cyber policy, and disaster recovery efforts. His passions include transforming health care and building strong communities.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. Formerly on the FBI’s Most Wanted list, Kevin Mitnick is a crucial figure in the history of information security, including approaches to social engineering and penetration testing.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Making matters worse, the cameras employ facial recognition technology, which leads to questions as to whether an attacker could actually identify individuals caught on camera and then pursue them as targets for social engineering schemes or something even more nefarious. When surveillance leads to spying.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. Next week we're doing social engineering.

Hacking 40