TelcoNews India - Telecommunications news for ICT decision-makers

Social Engineering stories - Page 3

Email attachment20260312 2842926 viqsh8

Fake Claude AI ads spread malware to target developers

Last month
#
cloud security
#
phishing
#
application security
Fake Claude AI search ads are spreading info-stealing malware, hijacking developer credentials and cloud access via spoofed download sites.
Hooded hacker in dim middle east government office night scene

Conflict sparks surge in Middle East cyber espionage

Last month
#
phishing
#
email security
#
cybersecurity
New research links Iran conflict to a swift surge in tightly targeted cyber espionage across Middle Eastern governments and embassies.
Smartphone layered translucent shields spiral threat icons

Appdome unveils Threat-Memory to track repeated attacks

Last month
#
malware
#
endpoint protection
#
application security
Appdome's new Threat-Memory tool stores on-device threat histories and AI scores to counter repeat mobile fraud and account takeovers.
Dark office pc abstract code symbolizing fileless malware night scene

Attackers abuse Deno runtime to deploy fileless malware

Last month
#
edr
#
cybersecurity
#
keylogging
Hackers are abusing the trusted Deno JavaScript runtime to run fileless CastleRAT malware solely in memory and evade endpoint defences.
Cinematic laptop deepfake face binary code broken locks quantum ai

IBM warns AI & quantum threats will reshape cybercrime

Last month
#
malware
#
data protection
#
ransomware
IBM warns shadow AI, deepfakes and quantum threats will reshape cyber risk by 2026, as autonomous agents speed breaches and ransomware.
Moody corporate cloud data center breach glowing cubes leaking

Salesforce guest flaws fuel large-scale data harvesting

Last month
#
saas
#
crm
#
firewalls
Misconfigured Salesforce Experience Cloud guest profiles are being exploited for mass data harvesting, with up to 400 firms possibly affected.
Atlassian williams

Keeper & Williams F1 launch identity-first security push

Last month
#
data protection
#
digital transformation
#
pam
Keeper Security has kicked off a global identity-first cybersecurity campaign as it enters a third season backing the Atlassian Williams F1 team.
Modern soc with ai cloud shield and hybrid endpoint protection

Fortinet unveils AI-driven cloud SOC & endpoint revamp

Last month
#
firewalls
#
endpoint protection
#
hybrid cloud
Fortinet debuts cloud SOC preview and unified FortiEndpoint as it leans on agentic AI to automate security ops and cut endpoint sprawl.
Aditya

Kernel in the crosshairs: The BlackSanta threat campaign targeting recruitment workflows

Last month
#
storage
#
phishing
#
hcm
A stealthy BlackSanta malware spree is hijacking HR recruitment workflows, killing endpoint defence tools and exfiltrating sensitive data.
Remote worker london facial recognition shield against deepfakes

iProov unveils biometric suite to combat deepfake fraud

Last month
#
surveillance
#
pam
#
mfa
iProov launches a biometric Workforce Solution Suite to verify real human presence and shield employers from deepfake-driven identity fraud.
Online fraud suspicious investment ads phone laptop warning icons

Bitdefender unmasks global Meta investment scam ads

Last month
#
phishing
#
martech
#
physical security
Bitdefender exposes 26,000 Meta ads in 25 countries pushing fake investment schemes, impersonating banks, media and public figures.
Meta smart glasses reflecting surveillance grid data leak risk

Sama credential leaks raise fears over Meta glasses data

Last month
#
wearables
#
data protection
#
surveillance
Leaked Sama staff logins tied to stealer malware spark fresh alarm over security of Meta Ray-Ban smart glasses video review pipeline.
Corporate worker inbox overwhelmed by similar suspicious emails

Dell email mixes payment-style header with promos

Last month
#
malware
#
network infrastructure
#
cx
Dell draws scrutiny after a promo email mimics a payment remittance notice, blurring lines between marketing, transactions and phishing risks.
Andy fielder cto at metacompliance

A resilient security culture is built in the flow of work, not the classroom

Last month
#
data protection
#
digital transformation
#
phishing
Rising UK cyber attacks show training alone is failing; firms must embed behavioural security cues into daily work to cut human risk.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Moody laptop dark desk phishing inbox shadowy hand global cyber threats

Israel-Iran conflict exploited in fresh email scam wave

Last month
#
phishing
#
physical security
#
email security
Scammers hijack Israel-Iran war headlines for classic advance-fee email cons, security researchers warn, urging users not to respond.
Digital shield protecting crypto coins blocking online scams

Bybit says 2025 security drive saved USD $300m from scams

Last month
#
crypto
#
fintech
#
phishing
Bybit says its 2025 Dynamic Risk-Based Protection System stopped scams from draining over USD $300m in suspicious crypto withdrawals.
Nighttime cybersecurity ops center email alerts ai shield scene

IRONSCALES adds AI agents to counter next‑gen phishing

Last month
#
uc
#
data protection
#
cloud security
IRONSCALES' Winter 2026 Release debuts three AI agents, outbound encryption and Teams deepfake defences to counter next‑gen phishing.
It service desk agent biometric facial scan secure auth workflow

1Kosmos adds identity checks to ServiceNow AI workflows

Last month
#
uc
#
surveillance
#
biometrics
1Kosmos adds embedded identity checks to ServiceNow AI workflows to curb social engineering in high-risk service desk interactions.