CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Social Engineering
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Social Engineering

Hacker holding USB flash drive showing endpoint management and social engineering
Cyber SecurityInsights

BadUSB: A Growing Cybersecurity Threat

December 19, 2022
BadUSB attacks have proliferated in the last year for a simple reason — they work as long as curiosity is part of human nature. The impact of BadUSB is tantamount to allowing an unknown hacker to sit at an employee’s unlocked computer and directly attack the network from the inside.
Read More
Close up of young man hand using smart phone at night showing social engineering on social media
Cyber SecurityInsights

Why Social Media Is a Weak Spot for Companies’ Cybersecurity

September 26, 2022
Cybercriminals are using social engineering to target company employees on social media, which remains a weak point even if a company takes every precaution necessary to protect in-house information.
Read More
Uber logo branded car on the street showing cybersecurity incident and network breach via social engineering
Cyber SecurityNews

Major Cybersecurity Incident at Uber: Network Breach Began With Social Engineering by Teenage Culprit, Sensitive Information Stored in Plaintext

September 19, 2022
Uber cybersecurity incident was the result of social engineering by teenage hacker. Network breach was a total compromise and that the attacker had full access to Uber's systems.
Read More
Marriott hotel showing data breach via social engineering
Cyber SecurityNews

Another Data Breach at Marriott as Social Engineering Attack Yields 300-400 Customer Credit Card Numbers

July 11, 2022
The data breach took place at the BWI Airport Marriott near Baltimore. A social engineering attack was executed on a member of the hotel staff, who unwittingly granted access.
Read More
Boy and father playing games showing account takeover via phishing and social engineering
Cyber SecurityNews

EA Confirms Account Takeover Attacks Compromising High-Profile Gamers via Phishing and Social Engineering Attacks

January 20, 2022
EA introduced new security measures to prevent account takeover attacks after hackers successfully breached high-profile players’ accounts via phishing and social engineering attacks.
Read More
Robinhood app and logo on the screen of a smartphone showing data breach due to social engineering on trading platform
Cyber SecurityNews

Data Breach of Robinhood Trading Platform Blamed on Social Engineering, Similar to 2020 Twitter Breach

November 15, 2021
Robinhood, the most popular app-based trading platform for non-professional investors, has confirmed that it suffered a data breach due to a social engineering attack last week that potentially compromised millions of accounts.”
Read More
Hacker pointing finger at laptop screen showing ransomware via social engineering
Cyber SecurityNews

Nigerian Threat Actors Skip Social Engineering, Make Direct Pitches to Employees To Install Ransomware on Company Networks

August 25, 2021
Most ransomware attacks begin with some combination of phishing and social engineering. An enterprising ransomware gang in Nigeria appears to be skipping this messy step, simply making a direct pitch to employees to join in on the attack.
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results