Apr 10 · 10 min read · A managed service provider posted on Reddit last week about a call they received from what appeared to be an official Google phone number. The caller claimed a "legacy request" had been submitted for the Gmail account tied to their phone. The whole t...
Join discussionApr 5 · 5 min read · 📋 Top Headlines at a Glance Week in review: Axios npm supply chain compromise, critical FortiClient EMS bugs exploited 36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants Axios npm hack used fake Teams error fix to h...
Join discussion
Mar 8 · 4 min read · TL;DR Large language models (Claude, GPT-4, Gemini) have become force multipliers for spear-phishing. Attackers use LLMs to personalize phishing emails with 90%+ accuracy. A single attacker can generate thousands of convincing, targeted phishing emai...
Join discussionMar 1 · 3 min read · In the realm of cybersecurity, technological defenses have become incredibly robust. Firewalls, endpoint detection, and encryption tools are stronger than ever. However, hackers have shifted their foc
Join discussion
Jan 30 · 4 min read · DISCLAIMER THIS HAS BEEN ISSUED AND WRITTEN ONLY FOR EDUCATIONAL PURPOSES ONLY, TO SEE HOW HACKERS USE SOCIAL ENGINEERING FOR RECONNAISSANCE AND HARVEST INFORMATION ABOUT THEIR TARGETS WE HAVE TO USE THIS TO BE INFORMED AND REALIZE HOW TO PREVENT THI...
Join discussion
Jan 26 · 7 min read · Tổng quan Trong nhiều năm trở lại đây thì email vẫn được xem là kênh phát tán mã độc và lừa đảo phổ biến nhất. Tuy nhiên, bức tranh an ninh mạng đang dần thay đổi. Các nhóm tin tặc hiện nay không còn giới hạn ở email mà đang chuyển hướng sang các nền...
Join discussion
Jan 26 · 5 min read · Overview In recent years, email has still been considered the most common channel for spreading malware and scams. However, the cybersecurity landscape is gradually changing. Hacker groups today are no longer limited to email but are shifting to prof...
Join discussion