Netcrook

Social Engineering

842 article(s)

Highway Heists Go Digital: How Hackers Are Stealing Cargo Shipments

🗓 17 Apr 2026 · 👤 CRYSTALPROXY

A new wave of hackers is targeting trucking companies, using phishing and remote access tools to steal physical shipments. Discover how these cyber-physical heists operate and what makes them so hard to stop.

Pyongyang’s MacOS Job Scam: North Korea’s Sapphire Sleet and the ClickFix Con

🗓 16 Apr 2026 · 👤 LOGICFALCON · 🌍 Asia

North Korea's Sapphire Sleet group is targeting macOS users with fake recruiter profiles and a social engineering technique known as ClickFix, tricking victims into running malicious scripts that steal sensitive data and crypto wallets. Microsoft and Apple are racing to counter this evolving threat.

ATHR: Inside the AI Vishing Platform Automating Cybercrime

🗓 16 Apr 2026 · 👤 CRYSTALPROXY

ATHR is revolutionizing vishing with AI-powered voice agents that automate phishing attacks, making cybercrime more accessible and harder to detect. Learn how this platform works and what it means for the future of digital security.

Obsidian Plugin Exploit Delivers PHANTOMPULSE RAT to Crypto and Finance Sectors

🗓 16 Apr 2026 · 👤 LOGICFALCON

Cybercriminals exploited the Obsidian app’s plugin system to deliver the PHANTOMPULSE remote access trojan in a targeted attack on finance and crypto professionals. The campaign used social engineering and blockchain-based C2 to evade detection.

How Hackers Hijack Automation Platforms: Inside the n8n Webhook Malware Surge

🗓 16 Apr 2026 · 👤 CRYSTALPROXY

Attackers are turning trusted workflow automation tools into malware delivery vehicles by exploiting n8n webhooks. Learn how these sophisticated campaigns work, why they're so hard to block, and the new defensive strategies experts recommend.

Phantom Aid: Inside UAC-0247’s Browser and WhatsApp Data Heist on Hospitals and Governments

🗓 16 Apr 2026 · 👤 LOGICFALCON · 🌍 Europe

UAC-0247 uses fake aid proposals and advanced malware to infiltrate Ukrainian hospitals and governments, stealing browser and WhatsApp data through sophisticated phishing and custom hacking tools.

How Hackers Turned n8n Automation into a Stealth Malware Highway

🗓 16 Apr 2026 · 👤 CRYSTALPROXY

A dramatic surge in phishing campaigns has exposed how attackers are abusing n8n automation webhooks to deliver malware and track victims, turning trusted workflow platforms into cybercrime tools.

Pushpaganda: How AI Scams Hijacked Google Discover Notifications

🗓 16 Apr 2026 · 👤 LOGICFALCON

A sophisticated cyber operation called Pushpaganda is using AI-generated content to hijack Google Discover feeds, delivering scam alerts and fraudulent ads to millions. Investigate how this scheme manipulates users and evades security.

Fake Adobe Reader Download Unleashes Fileless Remote Access Attack

🗓 16 Apr 2026 · 👤 CRYSTALPROXY

Cybercriminals used a fake Adobe Reader download page to launch a stealthy, fileless attack, installing ScreenConnect for remote access while evading traditional security tools.

How Cybercriminals Hijacked n8n Webhooks for Phishing & Malware Delivery

🗓 15 Apr 2026 · 👤 LOGICFALCON

Attackers have weaponized n8n’s automation platform, abusing webhook URLs to launch phishing campaigns, deliver malware, and track victims—all while hiding behind trusted domains. Discover how a productivity tool became a cybercrime vector.

1   2   3   4   5   Next »