Tag: phishing

  • In some of our previous posts, we spoke about how sophisticated phishing emails use typo-squatting to visually trick users into mistaking malicious domains as legitimate, for example, using ‘rn’ instead of an ‘m’, using ‘1’ instead of an ‘i’, etc.,… Read More

    They Look Identical. Only One Is Safe
  • Every now and then, we read all these articles on social engineering and conclude we’re too smart to be fooled. And then, a new scenario pops up that puts a shock through our cells, making us believe otherwise. Social Engineering… Read More

    The Kindness Hack: How Social Engineering Really Works
  • WhatsApp is having a tough time again. A lot of people advocate for the use of privacy focused apps such as Telegram or Signal over Whatsapp. Even though people believe WhatsApp’s security features can be hardened by tweaking some settings,… Read More

    A single WhatsApp group can get you hacked
  • In the last few years we have seen huge progress in technology and security tools. Still, some of the oldest tricks continue to work because people are not always aware of how these scams operate. One example that has become… Read More

    Too Good To Be True Car Deals
  • People used to believe VPNs made them anonymous, so they started using free ones — and I don’t know which is funnier: that, or the fact they basically handed hackers the keys to their bank accounts. A new security warning… Read More

    Think Your VPN Keeps You Safe? Think Again.
  • He thought it was a routine message from his bank. The email used the right logo, the tone sounded urgent but official, and the link looked legitimate at a glance. Within minutes he clicked, entered his details, and before the… Read More

    Don’t Let Phishing Steal Your Future
  • Emoji Smuggling: The Hidden Hack Threat to AI In recent months, cybersecurity researchers have uncovered a curious and concerning technique dubbed “emoji smuggling.” It is not about sneaking emojis past your parents content filters. It is a method to hide… Read More

    Hidden in Plain Sight: How Emoji Smuggling is Hacking AI
  • Recently I watched a short video that explained a Man in the Middle (MITM) attack using a simple unforgettable metaphor with a locked suitcase and I could not keep it to myself. If you want a quick intuitive picture of… Read More

  • North Korea’s Kimsuky hacking group is using artificial intelligence to create fake military ID cards in a new phishing campaign. Cybersecurity firm Genians Security Center reported that this marks a shift from the group’s older ClickFix tricks, where they showed… Read More

    Kimsuky Hackers Use AI Deepfakes in Military ID Phishing Attack
  • Imagine an email inbox under your control. Now imagine that another party, simply by sending you a specially crafted message, could make ChatGPT leak sensitive data from that inbox without you ever clicking anything and without any visible sign. That… Read More

    SHADOWLEAK – HOW AI CAN BE TRICKED INTO EMAIL THEFT