As email security tools became stronger, threat actors started looking for easier ways in — and they found one. Targeting identity providers like Okta through voice-based social engineering, a method known as vishing, proved far more effective than any email campaign
Category: Cyber Crime
Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies
The integration of artificial intelligence allowed the attacker to turn unfamiliar networks into mapped targets in hours rather than days. Recovered materials showed the attacker possessed over 400 custom attack scripts.
Facebook worker investigated by police after download of 30,000 private images | UK News | Sky News
Court records state that the employee is accused of having “accessed and downloaded approximately 30,000 private images belonging to Facebook users whilst working for Meta” and that he created a special computer script in order to do so.
North Korean workers are taking remote U.S. jobs. This company set a trap to expose one.
The stakes are high. In one case, a North Korean worker stole sensitive information related to U.S. military technology, according to the Justice Department. In another, an American accomplice obtained an ID that enabled access to government facilities, networks and systems.
FBI investigating ‘suspicious’ cyber activities on critical surveillance network | CNN Politics
“The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond,” the bureau said in a statement to CNN on Thursday, declining to elaborate.
Major cyberattack forces closure of clinics across Mississippi | CNN Politics
The closure affects all 35 of the University of Mississippi Medical Center’s health clinics, which provide a range of care to patients from cancer treatment to chronic-pain management. The attack also caused the cancelation of elective procedures in what health officials said would be a “multi-day event.”
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG).
Malware Hidden in Pirated Games Infects 400,000 Devices | PCMag
Researchers at cybersecurity vendor Cyderes are warning about the threat, which has been hiding inside cracked games and modified game installers for franchises including Far Cry, Need for Speed, FIFA, and Assassin’s Creed.
Dutch authorities allegedly seize VPN server without a warrant — company claims that law enforcement will return it after analyzing the device fully | Tom’s Hardware
Dutch authorities allegedly seize VPN server without a warrant — company claims that law enforcement will return it after analyzing the device fully | Tom’s Hardware Something to consider when…