Even the world’s biggest companies get suckered by social engineering

Both Apple and Meta were the victims of social engineering scams that caused them to simply giveaway user personal information. I am not going to call this sophisticated – actually it was quite simple – the cyber criminals, studied how an Emergency Data Requests (EDR) operated and then spoofed that …

There may not be direct cyber attacks from the Russia Ukraine conflict but others are taking advantage of the situation

Researchers at Google have been tracking various phishing cyber attacks, that are exploiting the Russia Ukraine conflict, but originate from other countries. China, Iran, North Korea, Russia and others using Ukraine invasion in phishing attacks: Google – The Record by Recorded Future Both state sponsored and financially motivated groups are …

Be very careful when you log-in online – things may not be what they seem

Social Engineering and Email Cyber Security Training

This browser-in-the-browser (BitB) is a technique for deceiving the user into thinking they are using a legitimate online login screen, such as when you log in to Microsoft 365 or Google Workspace. This browser-in-the-browser attack is perfect for phishing • The Register Behold, a password phishing site that can trick …