Advertisement · 728 × 90
#
Hashtag
#socialEngineering
Advertisement · 728 × 90
Preview
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as UNC1069. Maintainer Jason Saayman said the attackers tailored their social engineering efforts "specifically to me" by first approaching him under the guise of the founder of a

iT4iNT SERVER UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack VDS VPS Cloud #CyberSecurity #SupplyChainAttack #SocialEngineering #npm #Axios

0 0 0 0
Where Simulation Ends: Attackers are Using Social Engineering To Target Employee Decision-Making Beyond Training Scenarios Thomas Le Coz, CEO and Co-Founder, Arsen Security, explains why social engineering attacks are outpacing training and exposing gaps in human response.

Read the full interview:
www.technadu.com/where-simula...

Have you seen real-world attacks bypass training in your organization? Share your thoughts below 👇
#CyberSecurity #SocialEngineering #Phishing #SecurityAwareness #HumanRisk #AIAttacks

0 0 0 0
Post image

Training teaches patterns.
Attackers avoid them.
Thomas Le Coz:
“The most underestimated factor is definitely that emotional, gut-level reaction that just overrides rational thinking.”
AI is removing signals defenders rely on.

Your thoughts?
#CyberSecurity #SocialEngineering #HumanRisk

0 0 2 0
Preview
Chinese man pleads guilty in $27million US scam - Yes Punjab News Chinese national pleads guilty in $27M US scam targeting elderly victims, linked to India-based call centres and global fraud network.

Chinese man pleads guilty in $27million US scam yespunjab.com?p=235769

#FraudCase #USNews #ScamAlert #CyberCrime #MoneyLaundering #TechSupportScam #IndiaCallCenters #ElderlyScam #CrimeNews #FinancialFraud #BreakingNews #CryptoCrime #SocialEngineering #USJustice

0 0 0 0
Microsoft Warns of Social Engineering Campaign Abusing WhatsApp for Windows Microsoft warns of a new social engineering campaign targeting WhatsApp for Windows users. Attackers use malicious VBScript files and LOTL techniques to deploy remote access software.

📢 Microsoft warns of a social engineering campaign targeting WhatsApp for Windows users. Attackers use malicious VBScript files sent as attachments to install remote access malware. Be cautious with all attachments! ⚠️ #SocialEngineering #Malware #...

0 0 0 0
Post image

Europäische Kommission bestätigt Datenpanne auf der Webplattform Europa.eu durch einen Cyberangriff von Shinyhunters

#Cybersecurity #Cybersicherheit #Datenpanne #Identität Keeper Security #PrivilegedAccessManagement #Shinyhunters #SocialEngineering

netzpalaver.de/2026/...

0 0 0 0
Preview
Computer-enabled crimes: virtual robbery - Negative PID If Bonnie and Clyde had lived in our times, would they have still robbed a bank the way they did? Probably not. From a criminology perspective,

Computer-enabled crimes: virtual robbery
negativepid.blog/com...

#cybercrime #criminology #onlineCrime #digitalInvestigations #OSINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid

0 0 0 0
Preview
Finding loved ones through social media - Negative PID When Tamuna Museridze, a 40-year-old journalist from Georgia (the country), first suspected she might be adopted, the thought felt like something she couldn’t

Finding loved ones through social media
negativepid.blog/fin...

#socialMedia #facebook #onlineGroups #searchAngels #missingPeople #findingRelatives #digitalInvestigations #OSINT #SOCMINT #HUMINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
Preview
Lawfare Daily: What’s Influencing Politics Online? X’s Algorithm, Creators, and the New Persuasion Machine Podcast Episode · The Lawfare Podcast · March 31 · 48m

podcasts.apple.com/us/podcast/t...
Regarding the #algorithms of #SocialsMedia geared towards #SocialEngineering in the cultivation of extremist populist views

1 0 0 0
NCSC Warns of Messaging App Targeting

~Ncsc~
NCSC warns that Russia-based actors are targeting high-risk individuals on messaging apps like Signal and WhatsApp via social engineering.
-
IOCs: (None identified)
-
#Phishing #SocialEngineering #ThreatIntel

0 0 0 0

EvilTokens ramps up device code phishing targeting Microsoft 365 users

🔗 Read more: www.helpnetsecurity.com/2026/03/31/e...

#phishing #socialengineering #potatosecurity
@sekoia.io

0 0 0 0
Preview
EvilTokens ramps up device code phishing targeting Microsoft 365 users - Help Net Security Device code phishing activity aimed at Microsoft 365 users is increasing due to EvilTokens, specialized toolkit offered as-a-service.

EvilTokens ramps up device code phishing targeting Microsoft 365 users

🔗 Read more: www.helpnetsecurity.com/2026/03/31/e...

#phishing #socialengineering #cybersecurity
@sekoia.io

0 0 0 0
Post image

Erfolgreicher Cyberangriff auf EU-Kommission spielt angeblich 350 Gigabyte an Daten in die Hände der „ShinyHunters“

#Cyberangriff #Cybersecurity #Cybersicherheit #Darknet #Datenleak eset #Europa.eu #Identitätsprüfung #ShinyHunters #SocialEngineering #Vishing

netzpalaver.de/2026/...

0 0 0 0
Preview
When the Internet becomes the crime scene - Negative PID The internet didn't invent homicide. However, it's playing an important role in how offenders identify, approach, and control victims. In a small but

When the Internet becomes the crime scene
negativepid.blog/whe...

#cybercrime #serialCrime #criminology #digitalInvestigations #OSINT #SOCMINT #HUMINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
Preview
Digital profiling for cyber investigators - Negative PID We attended a seminar on the origins of serial killers by professor Micki Pistorius, Dphil., who was a criminal profiler in South Africa with the SAPS unit.

Digital profiling for cyber investigators
negativepid.blog/dig...

#digitalProfiling #digitalInvestigations #OSINT #SOCMINT #HUMINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
Preview
The danger zones of the dark web - Negative PID The dark web has been a part of public discourse for several decades. Known for its illicit activities and for hosting hackers and criminals of all kinds, it

The danger zones of the dark web

negativepid.blog/the...

#tor #torBrowser #anonymity #cyberCrime #darkMarkets #crypto #Cybersecurity #cyberThreats #onlineSecurity #digitalInvestigations #OSINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
Preview
The mystery of Cicada 3301 - Negative PID The Internet is like a vast world to be explored. Like any unexplored space, it’s full of wonders and possibilities, but also holds mysteries and dark

The mystery of Cicada 3301

negativepid.blog/the...

#cicada3301 #internetMysteries #unsolvedCases #socialMedia #hoaxes #ARGs #onlineRecruitment #digitalInvestigations #OSINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
Preview
The A858 puzzle - Negative PID The A858DE45F56D9BC9 (often shortened to A858) puzzle is an unresolved Internet mystery that has been captivating cryptography experts for years. It’s a

The A858 puzzle

negativepid.blog/the...

#cryptography #internetMysteries #unsolvedCases #coldCases #internetPuxxles #a858puzzle #digitalInvestigations #OSINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
Preview
Protecting endangered species with OSINT - Negative PID OSINT investigations are increasingly becoming essential in investigating a wide range of crimes. This is the fascinating case study of how EIA (the

Protecting endangered species with OSINT

negativepid.blog/how...

#illegalTrafficking #environmentProtection #darkMarkets #animalRights #marineLife #oceans #digitalInvestigations #OSINT #SOCMINT #HUMINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
The LinkedIn Bot That Tried to Pass the Turing Test (and Failed Spectacularly)

The LinkedIn Bot That Tried to Pass the Turing Test (and Failed Spectacularly)

zerotohero.dev/inbox/the-li...

#AI #AgenticAI #Identity #ZeroTrust #SecurityEngineering #SignalVsNoise #SocialEngineering #BotDetection #AISafety

1 0 0 0
Post image

FBI Warns Of Russia, Iran Cyber Activity
Read More: buff.ly/4qt8Mtm

#FBIwarning #CISA #RussiaCyber #IranCyber #SignalPhishing #AccountTakeover #SocialEngineering #SecureMessaging

0 0 0 0
Post image

Hochentwickelte PlugX-Malware-Kampagne nutzt den aktuellen Nahostkonflikt als Köder

#Cybersecurity #Cybersicherheit #Malware #PlugXBackdoor #PlugXMalware #SocialEngineering #Spionage @ThreatLabZ @Zscaler @Zscaler_DACH

netzpalaver.de/2026/...

0 0 0 0
Preview
The Identity of Satoshi Nakamoto - Negative PID The mystery of the identity of Satoshi Nakamoto is one of the most compelling enigmas in tech history. Satoshi is a mythic figure, almost like the crypto

The identity of Satoshi Nakamoto

negativepid.blog/the...

#satoshiNakamoto #bitcoin #crypto #blockchain #internetMysteries #tech #digitalInvestigations #OSINT #SOCMINT #HUMINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

0 0 0 0
Preview
Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner FAUX#ELEVATE phishing deploys stealers and miners via fake resumes, targeting enterprise systems, enabling rapid credential theft in 25 seconds.

Hackers are using fake résumés to steal data and deploy malware - HR inboxes have become prime entry points. Hiring season is attack season. 📄🎯 #SocialEngineering #Malware

thehackernews.com/2026/03/hack...

0 0 0 0
Palo Alto Networks Phishing Scam Targets Professionals A Palo Alto Networks phishing scam uses recruitment fraud to target professionals. Learn to identify and avoid these cybersecurity threats.

Full Article: www.technadu.com/palo-alto-ne...

💬 What’s your take on this new wave of recruitment scams? Comment below.
#Cybersecurity #Phishing #SocialEngineering #Infosec #OnlineSafety

0 0 0 0

Media Manipulation
- Distraction

By @theguardian.com

#Media #News #Propaganda
#Distraction #Misdirection
#Manipulation #SocialEngineering
#Statecraft #TheDarkArts
#PerversionsOfLogos

en.wikipedia.org/wiki/Media_m...

0 0 1 0
Anatomy of a developer-targeted supply chain attack A technical breakdown of a real malicious project sent to a developer — five attack vectors hidden behind a polished Web3 codebase, triggered by npm install or opening the folder in VSCode.

Supply chain attacks are shifting, #developers are now the target.

Compromise trust upstream and everything downstream is affected. Social engineering + dependencies = real risk.

Must-read 👇
indepth.dev/posts/1017/e...

#Cybersecurity #DevSecOps #SocialEngineering

1 0 0 0
Preview
OSINT for human trafficking investigation - Negative PID Human trafficking remains one of the most hidden and devastating crimes of our time. It thrives in in unregulated online spaces, private messaging platforms,

OSINT for human trafficking investigation

negativepid.blog/osi...

#humanTrafficking #digitalInvestigations #OSINT #SOCMINT #HUMINT #socialEngineering #cyberInvestigations #intelligence #darkWeb #negativepid

1 1 0 0
Post image

Am 10. März 2026 meldete Starbucks einen Datenschutzvorfall rund um das Mitarbeiterportal „Partner Central“. Unternehmen müssen nicht nur ihre Systeme härten, sie müssen ihre identitätsbezogenen Prozesse härten. #CyberSecurity #Phishing #SocialEngineering #KI #AI #Starbucks #Cybercrime

0 0 0 0
Post image

Meldebutton für Phishing in Microsoft-Teams

#EMail #HumanRiskManagement #IncidentResponse KnowBe4 #MicrosoftTeams #Phishing #SocialEngineering

netzpalaver.de/2026/...

0 0 0 0