Back to Basics: Cybersecurity's Weakest Link
Quick Read
But just ask Uber or Rockstar Games whether they thought that their systems were safe from social engineering.
All it took was a simple social engineering message – something like, "Hey Bob, I'm from the IT team, and we need to check something on your PC, so I'm sending you a tool for you to run.
"
Yet we're not learning
Social engineering was a driver for hacking over 20 years ago and, apparently, we still haven't moved away from it.
Adding insult to injury, successful social engineering isn't restricted to non-technical organizations.
It's very plausible that an unsavvy user in a backwater government department might fall for social engineering, for example, but much less so someone working at a leading tech firm – and we see that both Uber and Rockstar Games were impacted by social engineering.
However, social engineering attacks have so consistently been in the public news – not just cybersecurity news – that the excuse "I didn't know I shouldn't click email links" is getting harder and harder to accept.
If tech-savvy companies like Uber and Rockstar Games can get it wrong, then it can happen to anyone else too.
The Original Article can be found on
thehackernews.com
CISA Orders Federal Agencies to Regularly Track Network Assets and Vulnerabilities
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new Binding Operational Directive (BOD) that directs federal agencies in the country to keep track of …

BEC Scammer Gets 25-Year Jail Sentence for Stealing Over $9.5 Million
A 46-year-old man in the U.S. has been sentenced to 25 years in prison after being found guilty of laundering over $9.5 million accrued by carrying out cyber-enabled financial frau …

Five Steps to Mitigate the Risk of Credential Exposure
Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for ac …

Researchers Uncover Covert Attack Campaign Targeting Military Contractors
A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a multi-stage infection process designed to deploy …
