Is It Legit to Use Fear as Part of My Pretext?

One question I get asked often is, “Chris, isn’t it legit to use fear as part of my pretext in a social engineering exercise? I mean, after all, the bad guys are doing it. Wouldn’t it be realistic?”  Well I can’t argu… Continue reading Is It Legit to Use Fear as Part of My Pretext?

New SHA-1 Attack

There’s a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the co… Continue reading New SHA-1 Attack

New SHA-1 Attack

There’s a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions attack against SHA-1: on an Nvidia GTX 970, identical-prefix collisions can now be computed with a complexity of 261.2rather than264.7,… Continue reading New SHA-1 Attack

Threat Actor Impersonates USPS to Deliver Backdoor Malware

The campaign is consistent with emerging tactics from bad actors to use increasingly sophisticated social engineering and spoofing to deliver malware. Continue reading Threat Actor Impersonates USPS to Deliver Backdoor Malware

Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attacks

Attacks are targeting international companies in the financial sector, demanding that victims pay ransom in Bitcoin. Continue reading Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attacks

Fabricated Voice Used in Financial Fraud

This seems to be an identity theft first: Criminals used artificial intelligence-based software to impersonate a chief executive’s voice and demand a fraudulent transfer of €220,000 ($243,000) in March in what cybercrime experts described as an unusual case of artificial intelligence being used in hacking. Another news article…. Continue reading Fabricated Voice Used in Financial Fraud