Skip to content
Use promo code: EOnehMR2 at checkout for 20% Off 💐 with Optery’s Spring into Spring Sale! 🪺
Curves Curves
Shield

CrowdStrike’s 2025 Global Threat Report Reveals Phone-Based Social Engineering Is Surging

CrowdStrike’s 2025 Global Threat Report reveals adversaries are increasingly using identity compromise and social engineering to gain initial access and perform lateral movement.  In 2024, CrowdStrike Intelligence tracked a sharp rise in distinct campaigns leveraging telephone-based social engineering for initial access, including vishing and help desk impersonation tactics. Multiple adversaries incorporated vishing into their intrusionsContinue reading "CrowdStrike’s 2025 Global Threat Report Reveals Phone-Based Social Engineering Is Surging"
Shield

Leaked Chat Logs Reveal Black Basta’s Use of Data Brokers for Targeting Victims

A newly leaked trove of internal chat logs has exposed how the Black Basta ransomware gang leverages data broker info to research and target their victims. Black Basta is a notorious Russian-language ransomware group responsible for hundreds of cyberattacks on critical infrastructure and businesses worldwide. Known for its aggressive tactics, Black Basta has targeted majorContinue reading "Leaked Chat Logs Reveal Black Basta’s Use of Data Brokers for Targeting Victims"
Shield

Social Engineering Attacks and How Organizations Can Prevent and Defend Against Them

The vast majority of cyber attacks today begin with social engineering: the act of using exposed personal data to manipulate human targets into providing unauthorized access to an organization’s systems or data. As cybercriminals increasingly target the human element, social engineering has become the number one threat to businesses, leading to account takeovers, data breaches,Continue reading "Social Engineering Attacks and How Organizations Can Prevent and Defend Against Them"

Ready to safeguard your personal data?

Join the movement of people strengthening their privacy
Sign Up Free