article thumbnail

LastPass employee targeted via an audio deepfake call

Security Affairs

According to the password management software firm, the employee was contacted outside of the business hours. ” The employee ignored the contact and reported the attempt to the security team, the company confirmed that the incident did not impact the company.

article thumbnail

The Top Five Habits of Cyber-Aware Employees

CyberSecurity Insiders

The vast majority of cyberattacks rely on social engineering – the deception and manipulation of victims to coerce them into either opening malware or voluntarily providing sensitive information. Meanwhile, a quarter report that they’ve used generic passwords like “password” and “ABC123.”All

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A new phishing scam targets American Express cardholders

Security Affairs

Below are the recommendations provided by Armorblox to identify phishing messages: Augment native email security with additional controls; Watch out for social engineering cues; Follow multi-factor authentication and password management best practices; Follow me on Twitter: @securityaffairs and Facebook.

article thumbnail

3 of the Worst Data Breaches in the World That Could Have Been Prevented

Security Affairs

Weak passwords are the easiest way hackers can hack into a system. Organizations must have a robust password policy. One way to help enforce such a policy is by providing employees with a password manager for easy password generation and storage. Follow me on Twitter: @securityaffairs and Facebook and Mastodon.

article thumbnail

Threat actors scrape 600 million LinkedIn profiles and are selling the data online – again

Security Affairs

While not deeply sensitive, the information could still be used by malicious actors to quickly and easily find new targets based on the criminals’ preferred methods of social engineering. Beware of suspicious messages on social media and connection requests from strangers.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. Read more: Top IT Asset Management Tools for Security. Jeremiah Grossman | @jeremiahg.

article thumbnail

Nude photo theft offers lessons in selfie security

Malwarebytes

To gain access to the email accounts, he appears to have reset account passwords by correctly guessing password reset questions. He also used lists of compromised passwords to break into one account, and discussed social engineering tricks related to Snapchat. Defending yourself. This is a great place to start.