Articles by selected date

? S.E. Note. Classical social engineering.

? S.E. Note. Classical social engineering. • To carry out a successful attack, attackers need three components: time, perseverance and patience. Often, attacks using social engineering are carried out gradually and methodically — not only data about the right people are collected, but also so-called "social signals". This is done in order to gain trust and circumvent the target. For ? S.E. Note. Classical social engineering.

Social Engineering. Cheating bloggers and hijacking channels.

Social Engineering. Cheating bloggers and hijacking channels. • Yesterday, a video message was published from a well-known blogger (AICHI Beard), who covers the topic of programming and publishes interesting interviews with developers. The fact is that with the help of social engineering methods, the author was forced to enter data on a phishing resource, after which the account was hacked, and Social Engineering. Cheating bloggers and hijacking channels.

Symantec researchers report details about the activities of a cybercrime group they track as Bluebottle

Symantec researchers report details about the activities of a cybercrime group they track as Bluebottle, revealing significant similarities to the TTP gang OPERA1ER. As the researchers found out, Bluebottle hackers used a signed Windows driver to attack banks in French-speaking countries. At the same time, the actions and goals correspond to the OPERA1ER profile, which were attributed to at least Symantec researchers report details about the activities of a cybercrime group they track as Bluebottle