ClickFix infostealer is back, using fake CAPTCHA challenges to lure users into launching credential-stealing malware. Discover how this campaign blends social engineering with advanced in-memory attacks to evade detection and compromise sensitive data.
Optimizely has confirmed a data breach after a voice phishing attack exposed business contact information. The incident, linked to the ShinyHunters group, highlights the growing risk of social engineering and vishing campaigns targeting major organizations.
North Korea–linked hackers have shifted from simple crypto theft to complex, AI-driven scams, insider infiltration, and even building fake projects to siphon funds. Their evolving playbook has netted billions and now poses an unprecedented threat to the global crypto ecosystem.
A fake AI persona orchestrates a crypto heist by manipulating trust among autonomous agents, exposing a dangerous new class of supply chain attacks targeting both bots and their human owners.
Twelve months after the Bybit breach, North Korean hackers are intensifying their crypto attacks, using AI-powered social engineering and project infiltration to steal billions. Explore the evolving tactics and the growing threat to the entire crypto ecosystem.
Human error remains the Achilles’ heel of cybersecurity. This feature investigates why overlooking the human element is a risk organizations can no longer afford—and how failing to plan for mistakes is the greatest mistake of all.
Figure Technology faces fallout after a data breach exposes nearly a million customers. ShinyHunters, leveraging social engineering, orchestrated the attack—raising urgent questions about human factors in cybersecurity.
A fake Homebrew installer campaign is tricking Mac developers into installing Cuckoo Stealer, a potent infostealer and remote-access trojan, by abusing trust in copy-paste Terminal commands. No exploits—just social engineering.
A fake CAPTCHA prompt led employees to unwittingly install advanced malware, allowing attackers to infiltrate and persist within enterprise networks for months—all without exploiting any software vulnerabilities.
#Malware Epidemic | #Social Engineering | #Corporate Networks
A new wave of cybercrime uses AI-powered chatbots to impersonate trusted assistants like Google Gemini, luring victims into buying a fake cryptocurrency called 'Google Coin.' This investigative feature breaks down how the scam works and what red flags to watch for.