Remove Document Remove Information Security Remove Phishing Remove Social Engineering
article thumbnail

Experts detail a new Kimsuky social engineering campaign

Security Affairs

North Korea-linked APT Kimsuky has been linked to a social engineering campaign aimed at experts in North Korean affairs. SentinelLabs researchers uncovered a social engineering campaign by the North Korea-linked APT group Kimsuky that is targeting experts in North Korean affairs. shanumedia[.]com/pdf/ul/ji78fghJHKtgfLKJIO/s2.php?menu=ZGFu[.]vbQ==

article thumbnail

Hackers use a new technique in phishing attacks to disable Macro security warnings in weaponized docs

Security Affairs

Threat actors have devised a new trick to disable macro security warning that leverage non-malicious docs in phishing attacks. Most of the phishing attacks leverage weaponized Microsoft Office documents and social engineering techniques to trick recipients into enabling the macros. Zeus OpenSSL).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Coldriver threat group targets high-ranking officials to obtain credentials

Malwarebytes

These targets are approached in spear phishing attacks. The group uses social engineering techniques to persuade their targets to open documents or download malware. Once a relationship has been established, the target will receive a phishing link or a document containing such a link.

article thumbnail

An Empathic Approach to Security Education

Security Through Education

The Importance of Security Education According to Proofpoint’s 2023’s Human Factor report , more than 99% of threats require human interaction to execute, such as enabling a macro, opening a file, following a link, or opening a malicious document. This means social engineering plays a crucial role in a successful attack.

article thumbnail

Threat actors leak Activision employee data on hacking forum

Security Affairs

The Threat Actors successfully phished a privileged user on the network. They exfiltrated sensitive work place documents as well as scheduled to be released content dating to November 17th, 2023. “The security of our data is paramount and we have comprehensive information security protocols in place to ensure its confidentiality.

Hacking 89
article thumbnail

THE 11TH EDITION OF THE ENISA THREAT LANDSCAPE REPORT IS OUT!

Security Affairs

During the reporting period, key findings include: DDoS and ransomware rank the highest among the prime threats, with social engineering, data related threats, information manipulation, supply chain, and malware following.

article thumbnail

U.S. taxpayers hit by a phishing campaign delivering the Amadey bot

Security Affairs

Cofense researchers spotted a phishing campaign that is targeting taxpayers in the United States to infect them with the Amadey malware. Security experts at Cofense uncovered a phishing campaign that is targeting taxpayers in the United States attempting to infect them with a new piece of malware named Amadey. The post U.S.