Tag: social-engineering
-
What CISOs can learn from Doppel’s new AI-driven social engineering simulation
Doppel has introduced a new product called Doppel Simulation, which expands its platform for defending against social engineering. The tool uses autonomous AI agents to create … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/27/doppel-simulation-social-engineering/
-
LLMs easily exploited using run-on sentences, bad grammar, image scaling
Tags: access, advisory, ai, api, attack, control, data, email, exploit, google, governance, injection, LLM, malicious, network, open-source, openai, social-engineering, strategy, technology, threat, training, update, vulnerabilityThe trick is to give a really long set of instructions without punctuation or most especially not a period or full stop that might imply the end of a sentence because by this point in the text the AI safety rules and other governance systems have lost their way and given upModels are also easily…
-
Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks
Cybersecurity landscapes are undergoing a paradigm shift as threat actors increasingly deploy agentic AI systems to orchestrate sophisticated social engineering attacks. Unlike reactive generative AI models that merely produce content such as deepfakes or phishing emails, agentic AI exhibits autonomous decision-making, adaptive learning, and multi-step planning capabilities. These systems operate independently, pursuing predefined objectives without…
-
AI Summaries a New Vector for Malware
Malicious Prompts Hidden in Data can Trigger Executable Payloads. Hackers can transform artificial intelligence-powered summarization tools into unwitting delivery agents for ransomware instructions through hidden code and prompt manipulation, security researchers warn. The method is an evolution of ClickFix, a social engineering tactic. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-summaries-new-vector-for-malware-a-29299
-
Check Point Research deckt hochentwickelte Phishing-Kampagne ZipLine auf
ZipLine zeigt, wie ausgeklügelt Social-Engineering-Angriffe inzwischen sind. Webformular-Missbrauch, langfristige E-Mail-Konversationen und KI-bezogene Köder machen herkömmliche Erkennungsmethoden wirkungslos. Um mit der Geschwindigkeit der Angreifer Schritt zu halten, müssen Unternehmen auf ganzheitliche Schutzlösungen setzen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/check-point-research-deckt-hochentwickelte-phishing-kampagne-zipline-auf/a41800/
-
Hochentwickelte Phishing-Kampagne ‘ZipLine” zielt auf Fertigungs- und Lieferkettenindustrie ab
Check Point Research, die Sicherheitsforscher von Check Point Software Technologies warnt vor ‘ZipLine”, eine der fortschrittlichsten Social-Engineering-Phishing-Kampagnen der vergangenen Jahre. Die Attacken zielen präzise auf Unternehmen der US-amerikanischen und kombinieren neuartige Angriffsmethoden mit hohem Schadenspotenzial. Zipline: Umgedrehter Phishing-Ansatz Anstatt klassische Phishing-E-Mails zu versenden, wenden die Angreifer eine ungewöhnliche Vorgehensweise an: Sie nehmen über die öffentlichen…
-
Hochentwickelte Phishing-Kampagne ‘ZipLine” zielt auf Fertigungs- und Lieferkettenindustrie ab
Check Point Research, die Sicherheitsforscher von Check Point Software Technologies warnt vor ‘ZipLine”, eine der fortschrittlichsten Social-Engineering-Phishing-Kampagnen der vergangenen Jahre. Die Attacken zielen präzise auf Unternehmen der US-amerikanischen und kombinieren neuartige Angriffsmethoden mit hohem Schadenspotenzial. Zipline: Umgedrehter Phishing-Ansatz Anstatt klassische Phishing-E-Mails zu versenden, wenden die Angreifer eine ungewöhnliche Vorgehensweise an: Sie nehmen über die öffentlichen…
-
MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers
Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory malware dubbed MixShell.The activity has been codenamed ZipLine by Check Point Research.”Instead of sending unsolicited phishing emails, attackers initiate contact through a company’s public ‘Contact Us’ form, tricking First seen on thehackernews.com Jump to article:…
-
ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners
A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and cryptocurrency miners.The large-scale cybercrime campaign, first detected in August 2025, has been codenamed ShadowCaptcha by the Israel National First seen…
-
Warum das SOC in der Krise steckt und wie Sie das ändern
Tags: access, ai, authentication, breach, ciso, cloud, cyberattack, dark-web, detection, edr, identity, mail, monitoring, password, RedTeam, saas, service, siem, soc, social-engineering, strategy, threat, tool, update, vulnerability, vulnerability-management669226129Trotz Millioneninvestitionen in Security Operations Center (SOCs) und modernsten Detection-Technologien sind Breaches weiterhin an der Tagesordnung Tendenz weiterhin steigend.In meiner Erfahrung reagiert nur etwa jedes zwanzigste SOC effektiv auf die ausgeklügelten identitätsbasierten Angriffe, mit denen wir heute konfrontiert sind. Das ist allerdings kein technologisches, sondern ein Paradigmenproblem. Und es ist an der Zeit, zu erkennen,…
-
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities across the globe to advance Beijing’s strategic interests.”This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade First seen…
-
ClickFix is Compromising Thousands of Devices Daily Red Flags to Watch
Clever hackers are using ClickFix, a new social engineering technique, to deliver malicious payloads to unsuspecting users and devices around the globe. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-clickfix-attack-chain/
-
Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads
Tags: ai, cyber, cybercrime, email, hacker, injection, malicious, ransomware, social-engineering, strategy, toolCybercriminals have unveiled a novel variation of the ClickFix social engineering technique that weaponizes AI-powered summarization tools to stealthily distribute ransomware instructions. By leveraging invisible prompt injection and a “prompt overdose” strategy, attackers embed malicious directives within hidden HTML elements that AI summarizers in email clients, browser extensions, and productivity platforms faithfully reproduce in their…
-
Social Engineering: Krypto-Anleger verliert Bitcoin im Wert von 90 Millionen USD
Betrüger haben einen Krypto-Anleger um ein Vermögen gebracht. Der Geschädigte ist nun um 783 Bitcoin ärmer. Das Geld sieht er wohl nie wieder. First seen on golem.de Jump to article: www.golem.de/news/social-engineering-krypto-anleger-verliert-bitcoin-im-wert-von-90-millionen-usd-2508-199488.html
-
Ransomware-Report Q2 2025 von Coveware – Mehr Social Engineering und höhere Lösegeldsummen
First seen on security-insider.de Jump to article: www.security-insider.de/loesegeldzahlungen-steigerung-q2-2025-coveware-a-36f8ed642f1cd875192449746b155500/
-
ClickFix Exploit Emerges: Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS
Tags: attack, cyber, exploit, intelligence, macOS, malicious, microsoft, social-engineering, threat, windowsMicrosoft Threat Intelligence has spotlighted the escalating adoption of the ClickFix social engineering technique, a sophisticated method that manipulates users into executing malicious commands on their devices, bypassing traditional automated security defenses. Observed since early 2024, this tactic has targeted thousands of enterprise and end-user systems daily, delivering payloads such as Lumma Stealer infostealers, remote…
-
The new battleground for CISOs is human behavior
Attackers don’t always need a technical flaw. More often, they just trick your people. Social engineering works, and AI makes it harder to catch.” Only about one in four … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/22/social-engineering-threats-2025/
-
The Triple Threats CISOs cannot ignore: A Perfect Storm of Digital Frontlines, Dark AI and Quantum Leaps
Tags: ai, ciso, computer, computing, corporate, cyber, cybersecurity, data, deep-fake, email, encryption, firewall, fraud, governance, incident response, intelligence, malicious, penetration-testing, phishing, resilience, risk, scam, service, siem, soc, social-engineering, technology, threat, tool, training, vulnerabilityAdrian Hia, Managing Director for Asia Pacific at Kaspersky.Smart Security Operations Centers (SOCs) that leverage AI and real-time analytics to monitor, respond, and adapt to these complex new threats are critical. Adrian Hia further shared, “When incidents occur, response becomes critical. Every minute equates to dollars lost. organisations in Southeast Asia are increasingly relying on…
-
Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages
Threat actors have been observed leveraging the deceptive social engineering tactic known as ClickFix to deploy a versatile backdoor codenamed CORNFLAKE.V3.Google-owned Mandiant described the activity, which it tracks as UNC5518, as part of an access-as-a-service scheme that employs fake CAPTCHA pages as lures to trick users into providing initial access to their systems, which is…
-
Drittanbieter-Tools ohne PAM können zu gefährlichen Einstiegspunkten für Cyberkriminelle werden
Die Datenpanne bei Workday ist ein perfektes Beispiel für das anhaltende und wachsende Risiko, das von Social-Engineering-Angriffstaktiken auf Drittanbieterplattformen ausgeht. Die Situation spiegelt einen beunruhigenden Trend bei Anbietern von Unternehmenssoftware wider und scheint mit einer breiteren Welle jüngster Angriffe verbunden zu sein, die in ähnlicher Weise CRM-Systeme mehrerer globaler Unternehmen über ausgefeilte Social-Engineering- und OAuth-basierte…
-
Prepping the Front Line for MFA Social Engineering Attacks
Attackers will continue to evolve, and the help desk will always be a target. But with the right mix of training, support, and trust, frontline agents can become your biggest security assets. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/prepping-front-line-mfa-social-engineering-attacks
-
Prepping the Front Line for MFA Social Engineering Attacks
Attackers will continue to evolve, and the help desk will always be a target. But with the right mix of training, support, and trust, frontline agents can become your biggest security assets. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/prepping-front-line-mfa-social-engineering-attacks
-
URL-based threats become a go-to tactic for cybercriminals
Cybercriminals are using advanced social engineering and AI-generated content to make malicious URLs difficult for users to identify, according to Proofpoint. Whether through … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/21/phishing-url-based-threats/
-
Workday Hit by Social Engineering Attack, Third-Party Data Exposed
Workday’s recent data breach might be tied to ShinyHunters, a group accused of exploiting Salesforce CRM at firms like Google, Adidas, Qantas, and Louis Vuitton. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-workday-data-breach-august/
-
Threat Actors Impersonate as Google Support to Sniff Out Your Login Credentials
Threat actors are posing as Google support agents in an increasing number of complex social engineering attacks in order to take advantage of account recovery tools and obtain user credentials without authorization. These campaigns leverage legitimate-looking communication channels, such as spoofed phone numbers associated with Google’s official contact information, to build credibility and manipulate victims…
-
Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack
Workday, a leading provider of human resources and financial management software, has confirmed that it fell victim to a data breach stemming from a social engineering attack targeting a third-party Customer Relationship Management (CRM) system. According to the company, the breach did not impact its customer tenants or the secure data therein; instead, the compromised…
-
Phishing 2025: URLs als größte Gefahr für Nutzer
Das Cybersecurity-Unternehmen Proofpoint hat in seinem ‘Human Factor Report 2025″ alarmierende Entwicklungen im Bereich Phishing und Social Engineering dokumentiert. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/phishing-urls-gefahr-fuer-nutzer
-
Hackers target Workday in social engineering attack
Researchers cite increasing evidence of collaboration between Scattered Spider and the cybercrime group ShinyHunters in the campaign. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/hackers-target-workday-in-social-engineering-attack/758095/
-
ClickFix Phishing Attacks Surge Nearly 400% in Just One Year
Phishing evolves: ClickFix attacks jump 400% in a year while quishing rises, proving criminals favor social engineering over malware. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/clickfix-phishing-surges-2025/
-
ShinyHunters strike again: Workday breach tied to Salesforce-targeted social engineering wave
Social engineering jackpot for ShinyHunters: The Workday breach slots into a much larger pattern of attacks exploiting Salesforce instances across multiple industries. Reports attribute the campaign to ShinyHunters, the notorious BreachForums admin, whom Google was tracking as UNC6040 when it first disclosed the campaign.Victims include Google itself, which said attackers accessed a Salesforce environment in…

