article thumbnail

Threat Group Use AI Adult-Based “Deepnude” Image Generator Honeypots to Infect Victims

KnowBe4

Appealing to the most depraved of society, threat group FIN7 use the lure of generating nude images of favorite celebrities to get victims to download their NetSupport RAT.

Honeypots 115
article thumbnail

Vulnerability Recap 11/4/24 – Fourteen-Year Bug Finally Gets Patched

eSecurity Planet

Sysdig discovered the threat when it found in its cloud honeypot a strange bucket using a compromised account. The threat actors then stash any stolen data in a previous victim’s S3 bucket. They’ve stolen over 10,000 cloud credentials thus far, Sysdig reports. This significantly reduces threat actors’ opportunities to attack.

Cloud 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catches of the Month: Phishing Scams for May 2023

IT Governance

Welcome to our May 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. The latest issue facing the AI landscape is a report detailing phishing campaigns masquerading as ChatGPT. to create ‘@paypaI.com’.

article thumbnail

Best Internet Security Suites & Software for 2022

eSecurity Planet

Originally developed to detect and remove malware or computer viruses, modern antivirus software can now protect against ransomware, browser attacks, keyloggers, malicious websites, and even sometimes phishing attempts. Phishing is a major problem for both consumers and businesses, and many phishing attempts come through email.

Security 144
article thumbnail

Challenges faced while training an AI to combat abuse

Elie

On the other hand, if you would like to train a classifier that recognizes phishing pages, this “collect once” approach doesn’t work because phishing pages keep evolving and look drastically different over time, as visible in the screenshot above. Collecting ground truth with honeypots.

article thumbnail

Challenges faced while training an AI to combat abuse

Elie

On the other hand, if you would like to train a classifier that recognizes phishing pages, this “collect once” approach doesn’t work because phishing pages keep evolving and look drastically different over time, as visible in the screenshot above. Collecting ground truth with honeypots : Honeypots.

article thumbnail

APT Attacks & Prevention

eSecurity Planet

Phishing & Watering Holes. The primary attack vector for most attacks, not just APTs, is to use phishing. Some APTs cast a wide net with general phishing attacks, but others use spear phishing attacks to target specific people and specific companies. APT Attacks to Gain Access.

Access 110