Tag - social engineering

Office 365 Phishing Attack Using Realtime Validation

Office 365 Phishing Attack Using Real-Time Validation

To steal Office 365 login information from users, criminals used a phishing attack that used real-time validation against an institution’s Active Directory. It was reported that the attack was made against an executive of a financial organisation.  The email, along with the subject line “ACH Debit Report,” used spoofing tactics [...]

Read more...
Instagram "Help Center" Phishing Attack

Instagram “Help Center” Phishing Attack

Instagram “Help Center” Phishing Attack 1- About This Phishing Attack Cyber Security Researchers warn against professional phishing attacks aimed at stealing user information that targets Instagram users and these phishing attacks being sent with direct messages via the application to users. Cyber Security Researchers stated that “Attackers are sending legitimate messages that [...]

Read more...
Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
Baiting

Baiting

In this blog, we are going to discuss Baiting which is a common method of a Social Engineering attack the others include phishing, pretexting, watering holes, quid pro quo and tailgating.  1. What is Baiting? Baiting is Phishing’s devious cousin. As the name suggests, Baiting involves luring an unsuspecting victim with [...]

Read more...
Taidoor RAT malware

New Chinese Malware – Taidoor

US government agencies say Taidoor malware has been around since 2008 and is a remote access Trojan (RAT) type of malware. 1. What is a RAT? (Remote Access Trojan)  It is a type of malware that causes hackers to have remote access to the device of the target user and to take [...]

Read more...
Watering Hole Attacks

Watering Hole Attacks

“What are watering hole attacks” and “how to mitigate them” have been some of the most frequently asked questions people are looking to find answers to today. In this article, we will cover the definition of watering hole attacks, provide some real examples, and conclude with measures that can [...]

Read more...
social engineering

Social Engineering

Social engineering attacks have many different tactics and can be initiated by a number of means targeting humans. Social engineering techniques vary, however, we will discuss the five most common forms of social engineering attacks.  1.What is a Social Engineering Attack? A Social Engineering Attack is a method of obtaining confidential [...]

Read more...
Phishing security test tool

Badge Surfer Attack – Physical Security – SAUDI ARAMCO BREACH

Badge Surfer Attack – Phishing security test  tool – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 1, SAUDI ARAMCO BREACH In our 1st Episode of Season 2, one of the world’s largest oil producers has roughly 35,000 of its computers shut down in a matter of hours due to [...]

Read more...
Telephone social engineering

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING In Episode 10, a young finance executive is denied a job after his employer tells him that his credit rating is horrible.  He comes to find out that this was due to an identity theft issue originated by [...]

Read more...
No Phishing

Don’t take the bait!

Phishing email messages, websites, and phone calls are designed to steal confidential information or money. Cybercriminals can use social engineering tactics such as spear phishing by installing malicious software on your computer by stealing personal information.  They manipulate you to install malicious software or give your credentials under false [...]

Read more...