Social Engineering
842 article(s)
🗓 17 Apr 2026 · 👤 CRYSTALPROXY
A new wave of hackers is targeting trucking companies, using phishing and remote access tools to steal physical shipments. Discover how these cyber-physical heists operate and what makes them so hard to stop.
🗓 16 Apr 2026 · 👤 LOGICFALCON · 🌍 Asia
North Korea's Sapphire Sleet group is targeting macOS users with fake recruiter profiles and a social engineering technique known as ClickFix, tricking victims into running malicious scripts that steal sensitive data and crypto wallets. Microsoft and Apple are racing to counter this evolving threat.
🗓 16 Apr 2026 · 👤 CRYSTALPROXY
ATHR is revolutionizing vishing with AI-powered voice agents that automate phishing attacks, making cybercrime more accessible and harder to detect. Learn how this platform works and what it means for the future of digital security.
🗓 16 Apr 2026 · 👤 LOGICFALCON
Cybercriminals exploited the Obsidian app’s plugin system to deliver the PHANTOMPULSE remote access trojan in a targeted attack on finance and crypto professionals. The campaign used social engineering and blockchain-based C2 to evade detection.
🗓 16 Apr 2026 · 👤 CRYSTALPROXY
Attackers are turning trusted workflow automation tools into malware delivery vehicles by exploiting n8n webhooks. Learn how these sophisticated campaigns work, why they're so hard to block, and the new defensive strategies experts recommend.
🗓 16 Apr 2026 · 👤 LOGICFALCON · 🌍 Europe
UAC-0247 uses fake aid proposals and advanced malware to infiltrate Ukrainian hospitals and governments, stealing browser and WhatsApp data through sophisticated phishing and custom hacking tools.
🗓 16 Apr 2026 · 👤 CRYSTALPROXY
A dramatic surge in phishing campaigns has exposed how attackers are abusing n8n automation webhooks to deliver malware and track victims, turning trusted workflow platforms into cybercrime tools.
🗓 16 Apr 2026 · 👤 LOGICFALCON
A sophisticated cyber operation called Pushpaganda is using AI-generated content to hijack Google Discover feeds, delivering scam alerts and fraudulent ads to millions. Investigate how this scheme manipulates users and evades security.
🗓 16 Apr 2026 · 👤 CRYSTALPROXY
Cybercriminals used a fake Adobe Reader download page to launch a stealthy, fileless attack, installing ScreenConnect for remote access while evading traditional security tools.
🗓 15 Apr 2026 · 👤 LOGICFALCON
Attackers have weaponized n8n’s automation platform, abusing webhook URLs to launch phishing campaigns, deliver malware, and track victims—all while hiding behind trusted domains. Discover how a productivity tool became a cybercrime vector.
1  
2  
3  
4  
5  
Next »