Malware in developer coding tests
Hackers continue to target developers: during a fake job interview, they ask “potential employees” to run a script from GitHub that hides a backdoor.
33 articles
Hackers continue to target developers: during a fake job interview, they ask “potential employees” to run a script from GitHub that hides a backdoor.
Another celebration… for scammers. How cybercriminals scam women ahead of March 8.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?
Scammers are using social engineering to shake down newly onboarded employees.
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
We present four rules of safe trading for gamers who earn money from in-game trades.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
One explanation of phishing success lies in a known psychological effect.
Charles Perrault explains how hired hackers use social engineering and watering hole attacks for political purposes.
Social engineering augmented with machine-learning algorithms can deceive even high-ranking executives.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.