Vishing

Lazarus hacking group infiltrates European Drone manufacturers to steal Intelligence

Lazarus Group, a notorious cybercrime organization believed to be backed by North Korea’s intelligence agencies, has reportedly launched a sustained cyber-espionage campaign targeting drone manufacturers across Europe. The group’s objective is to steal highly sensitive proprietary information related to unmanned aerial vehicle (UAV) technology, including drone designs, operational systems, and manufacturing processes. This stolen intelligence […]

Microsoft Teams Enhances Security to Combat Voice-Based Cyber Threats

In recent years, social engineering attacks have become increasingly sophisticated, with one notable case involving a prominent corporate company in the United States falling prey to Vishing attack via Microsoft Teams. This attack started with fraudulent phone calls but soon evolved into a series of complex cyber threats, ultimately exploiting the vulnerabilities of communication platforms. […]

US Secret Service disrupts Sim Server operations used for Vishing

The United States Secret Service has issued a public statement confirming the disruption of a significant cybercrime operation involving over 300 SIM servers. These servers, all co-located at a location in the New York tristate area, are believed to have been used by cybercriminals to launch vishing attacks—a form of social engineering targeting individuals over […]

How to Thwart Social Engineering Attacks: Essential Strategies for Protection

In today’s digital age, where cyber-attacks are becoming more sophisticated, one of the most common yet underestimated threats is social engineering. Social engineering attacks rely on psychological manipulation to trick individuals into divulging confidential information, clicking on malicious links, or granting unauthorized access to systems. These attacks can have devastating consequences, from financial loss to […]

Cyborg Social Engineering: Defending against personalised attacks

Generative AI has the potential to make social engineering attacks much more sophisticated and personalised. The technology can rapidly mine sites for information on a company, individuals, their responsibilities and specific habits to create multi-level campaigns. Through automated gethering of information, the technology can acquire photos, videos and audio recordings which can then be used […]

Share this page