article thumbnail

Black Hat AI Tools Fuel Rise in Business Email Compromise (BEC) Attacks

eSecurity Planet

“WormGPT produced an email that was not only remarkably persuasive but also strategically cunning, showcasing its potential for sophisticated phishing and BEC attacks” (screenshot below). ” Just last week, Acronis reported that AI tools like ChatGPT have been behind a 464% increase in phishing attacks this year.

article thumbnail

New Linux Malware Shikitega Can Take Full Control of Devices

eSecurity Planet

This strategy seems to be a trade-off, as such services are way easier to take down by authorities, but it allows bypassing network security products that don’t block legitimate providers. AT&T labs provided a list of IoCs (indicators of compromise) that system administrators can use to add specific rules to security solutions.

Malware 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Vulnerability Recap – Sept. 11, 2023 – Android Update Fixes 33 Vulnerabilities

eSecurity Planet

Android, Apple, Apache, Cisco, and Microsoft are among the names reporting significant security vulnerabilities and fixes in the last week, and some of those are already under assault by hackers. Business email compromise (BEC) assaults were the main aim of this large phishing effort, which resulted in significant financial losses.

VPN 111
article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue teams consist of security analysts, network engineers and system administrators. The team may be divided into sub-teams depending on the type of security controls it is responsible for, such as network security, endpoint security, or the security operations center (SOC).

article thumbnail

5 Emotions Used in Social Engineering Attacks [with Examples]

SecureWorld News

He writes about this in his book, "Ghost in the Wires": "I would call the company I'd targeted, ask for their computer room, make sure I was talking to a system administrator, and tell him, 'This is [whatever fictitious name popped into my head at that moment], from DEC support. Mitnick says his favorite emotional tool was fear.

article thumbnail

How to Write Spotless Job Description to Attract Cybersecurity Pros to Your Business

CyberSecurity Insiders

According to Finances Online , most common cybersecurity attack vectors in 2020 include phishing (38%), network intrusions (32%), stolen/lost records (8%), and system misconfiguration (5%). The skills you should be on the lookout for in your candidates’ resumes are: Network protocols knowledge.

B2B 70
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

In recent years, Cluley has been well-known for his cybersecurity analysis, blog, and award-winning podcast Smashing Security. Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller. Read more: Top IT Asset Management Tools for Security. — thaddeus e.