Remove Cybercrime Remove Social Engineering Remove Threat Detection
article thumbnail

The Impact of AI on Social Engineering Cyber Attacks

SecureWorld News

Social engineering attacks have long been a threat to businesses worldwide, statistically comprising roughly 98% of cyberattacks worldwide. Given the much more psychologically focused and methodical ways that social engineering attacks can be conducted, it makes spotting them hard to do.

article thumbnail

MUT-1244 Campaign Steals Hundreds of Thousands of WordPress Credentials and More

SecureWorld News

Researchers at Datadog Security Labs have uncovered a year-long, large-scale cybercrime campaign by a threat actor tracked as MUT-1244. This operation, which blends social engineering and technical exploitation, has resulted in the theft of more than 390,000 WordPress credentials.

Phishing 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile Malware Uses Deepfakes, Social Engineering to Bypass Biometric Authentication

SecureWorld News

The hackers rely heavily on social engineering tactics to distribute the malware. Education on verifying app downloads, MFA, advanced threat detection, encrypted communications, and tighter mobile device management controls can all contribute to protecting users.

article thumbnail

Research Examines WormGPT, an AI Cybercrime Tool Used in BEC Attacks

SecureWorld News

In its latest research , SlashNext—a provider of multi-channel phishing and human hacking solutions—delves into the emerging use of generative AI, including OpenAI's ChatGPT, and the cybercrime tool WormGPT, in Business Email Compromise (BEC) attacks. Urgency is a key emotion that social engineers prey upon to induce actions."

article thumbnail

Luxury, Loyalty and Lateral Movement: Retail and Banking Attacks Surge

SecureWorld News

While the company emphasized that no financial data or passwords were exposed, the incident raises concerns about the potential for highly targeted phishing and social engineering , particularly given the brand's clientele of high-net-worth individuals (HNWIs). But even that's not enough.

Retail 65
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

Organizations should likewise leverage GenAI to better detect AI-enhanced threats and counter the attack volumes that we expect to see in 2024. They’ll make adept use of social engineering, leverage insider knowledge of systems and workflows and exploit weak cloud configurations and porly implemented multi-factor authentication.

article thumbnail

Honeywell Report OT Under Siege

SecureWorld News

These threats often bypass traditional perimeter defenses due to: Legacy systems with poor EDR/AV coverage Air-gapped environments with outdated patching Insider mishandling or social engineering The report stresses implementing secure media transfer protocols and advanced scanning stations as part of basic hygiene for critical environments.

Media 54