I published an article yesterday on CyberAwake looking at how gift cards are misused by threat actors: How Gift Cards are exploited by Cyber Criminals – CyberAwake
Threat actors are always on the lookout for ways to get to you
So a new trend going viral on a social media platform is an ideal place to interfere with and use to spread malware. Just like the “Invisible Body” challenge on TikTok: TikTok ‘Invisible Body’ challenge exploited to push malware (bleepingcomputer.com) Do not be deceived by the offer from the hackers …
Continue reading “Threat actors are always on the lookout for ways to get to you”
iOS Scareware
Although this series of cyber-attacks is closely associated with the Ukraine/Russia conflict you should expect to see other cyber criminals adopting similar tactics: Ukraine Themed Twitter Spam Pushing iOS Scareware – SANS Internet Storm Centre This article by Johannes Ullrich shows the web of accounts that threat actors weave across …
Stress – the classic social engineering tactic
Threat actors have to find ways of breaking down our cyber security training – that is where social engineering comes in. They want to find some way to get you to do what they want – this usually means exploiting your trust, but a bt of stress in there to …
Continue reading “Stress – the classic social engineering tactic”