article thumbnail

North Korean APT group targets email credentials in social engineering campaign

CSO Magazine

Researchers warn of a social engineering campaign by the North Korean APT group known as Kimsuky that attempts to steal email credentials and plant malware. Operating since at least 2012, the group often employs targeted phishing and social engineering tactics to gather intelligence and access sensitive information."

article thumbnail

5 old social engineering tricks employees still fall for, and 4 new gotchas

CSO Magazine

Blame it on pandemic fatigue, remote work or just too much information, but employees appear to be lowering their guard when it comes to detecting social engineering tricks. Attackers were more successful with their social engineering schemes last year than they were a year earlier, according to Proofpoint.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 top anti-phishing tools and services

CSO Magazine

Phishing continues to be one of the primary attack mechanisms for bad actors with a variety of endgames in mind, in large part because phishing attacks are trivial to launch and difficult to fully protect against. Why phishing is successful. Most phishing attacks are less about the technology and more about social engineering.

Phishing 136
article thumbnail

What is phishing? Examples, types, and techniques

CSO Magazine

Phishing definition. Phishing is a type of cyberattack that uses disguised email as a weapon. Phish" is pronounced just like it's spelled, which is to say like the word "fish"—the analogy is of an angler throwing a baited hook out there (the phishing email) and hoping you bite.

Phishing 120
article thumbnail

Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams

CSO Magazine

Security researchers have used the GPT-3 natural language generation model and the ChatGPT chatbot based on it to show how such deep learning models can be used to make social engineering attacks such as phishing or business email compromise scams harder to detect and easier to pull off.

Scams 127
article thumbnail

What are phishing kits? Web components of phishing attacks explained

CSO Magazine

Editor's note: This article, originally published on August 7, 2018, has been updated to include new information on phishing kit features. Phishing is a social attack, directly related to social engineering. Commonly centered around email, criminals use phishing to obtain access or information.

Phishing 118
article thumbnail

8 top multifactor authentication products and how to choose an MFA solution

CSO Magazine

Whether it’s advanced phishing techniques, credential stuffing, or even credentials compromised through social engineering or breaches of a third-party service, credentials are easily the most vulnerable point in defending corporate systems. Get the latest from CSO by signing up for our newsletters. ]