Remove InfoSec Remove Scams Remove Social Engineering
article thumbnail

ChatGPT: What are the Implications for Infosec?

SecureWorld News

The ability to ask any question on just about any topic and have a very intelligent answer given has cybersecurity experts wondering if the infosec community is using it and, if so, for what; and, if so, how is it working for writing scripts and code or imitating phishing emails, for instance. The script to do that was written by ChatGPT.

InfoSec 145
article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. One of our jobs is to make sure the brand stays true to its zeitgeist, its character, and [Infosec] really had it down right from the beginning.”. What do you do?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack

Security Boulevard

A phone scam targeting psychologists reveals that even professionals can become victims, stolen multi-million-dollar NFT’s results in a “all my apes gone” plea for help, and details on a skimmer supply chain attack on more than 100 real estate websites. ** Links mentioned on the show ** The Phone Scam That Targets Psychologists [link] Thieves […].

Scams 104
article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

I seem to be doing most of that activity now on Mastodon , which appears to have absorbed most of the infosec refugees from Twitter, and in any case is proving to be a far more useful, civil and constructive place to post such things. com, which was fed by pig butchering scams.

article thumbnail

Personal Cybersecurity Concerns for 2023

Security Through Education

Impersonation Scams. These range from simple to sophisticated scams to convince you they are genuine, in hopes that you feel comfortable sharing personal or financial information whether on the phone, via email, or text. Although BEC attacks may be targeted at business, they can also be used to scam individual people.

article thumbnail

Scattered Spider x RansomHub: A New Partnership

Digital Shadows

The attacker gained initial access to two employee accounts by carrying out social engineering attacks on the organization’s help desk twice. Leveraging its English proficiency, the collective uses social engineering for initial access. Within six hours, the attacker began encrypting the organization’s systems.

article thumbnail

Top 8 Cybersecurity Podcasts of 2021

eSecurity Planet

It requires some baseline industry knowledge, but it’s a great way to stay on top of InfoSec current events. Since 2007 (before podcasting in general had really taken off), Patrick Gray and his co-host Adam Boileau have covered a wide range of InfoSec topics with insight from fellow industry leaders. Malicious Life.