article thumbnail

Experts link the Black Basta ransomware operation to FIN7 cybercrime gang

Security Affairs

It focused on deploying POS malware and launching targeted spear-phishing attacks against organizations worldwide. In order to weaken the security defenses installed on the target machine, Black Basta targets installed security solutions with specific batch scripts downloaded into the Windows directory.

article thumbnail

Crooks abuse GitHub platform to host phishing kits

Security Affairs

Experts at Proofpoint discovered that free code repositories on GitHub have been abused since at least 2017 to host phishing websites. Researchers at Proofpoint reported that crooks are abusing free code repositories on GitHub to host phishing websites and bypass security defenses. SecurityAffairs – GitHub, cybercrime).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New AI Threats Emerge as FraudGPT Creator Unleashes DarkBERT and DarkBART

eSecurity Planet

New AI-powered cybercrime tools suggest that the capability of AI hacking tools may be evolving rapidly. The creator of FraudGPT, and potentially also WormGPT , is actively developing the next generation of cybercrime chatbots with much more advanced capabilities.

article thumbnail

Black Hat AI Tools Fuel Rise in Business Email Compromise (BEC) Attacks

eSecurity Planet

They found a tool called WormGPT “through a prominent online forum that’s often associated with cybercrime,” Kelley wrote in a blog post. ” The security researchers tested WormGPT to see how it would perform in BEC attacks. .” Refining phishing or BEC attack emails using generative AI.

article thumbnail

Commenting on the SANS Threat Intelligence Summit 2021 Presentations – An Analysis and Practical Recommendations

Security Boulevard

The dissemination phase consists of active processing and dissemination of the processed data for the purpose of communicating the actionable intelligence for the purpose of ensuring that an organizations defense is actively aware of the threats facing its infrastructure and security defense mechanisms.

article thumbnail

Protect your business with security awareness training

SiteLock

Even a company with the most sophisticated cybersecurity tools and expert security teams can fall prey to cybercriminals if they overlook one area of vulnerability: their people. In fact, 97% of us can’t tell a phishing email from a legitimate one. Humans can be distracted, intimidated and especially – misled.

article thumbnail

The Impact of AI on Social Engineering Cyber Attacks

SecureWorld News

Whether manifesting itself in a sophisticated phishing email or as a calculated series of conversations between employees and seemingly innocuous or "legitimate" parties with ulterior motives, a social engineering attack can have dire consequences. The average business faces more than 700 of these types of attacks every single year.