social engineering
-
Microsoft tightens Edge’s Internet Explorer mode after reports of exploit chain
Microsoft said it has tightened Internet Explorer mode in Edge after reports that attackers used social engineering and unpatched Chakra 0-day exploits to gain remote code execution and escalate privileges, and the company removed easier IE mode launch options and now requires explicit enabling.
-
Insight Partners notifies thousands after ransomware breach, exposing personal and investor data
New York-based Insight Partners said thousands of individuals were affected by a ransomware breach that involved data exfiltration and subsequent server encryption, with notification letters and identity monitoring offered to impacted individuals and a Sept. 2025 deadline for confirming exposure.
-
Open AWS bucket exposes 1.6 million gym audio recordings, researchers warn of privacy risk
A security researcher says an unencrypted AWS bucket exposed 1.6 million gym audio recordings containing names, numbers and reasons for calls, highlighting privacy and security risks from stored voice data.
-
Zscaler confirms Salesforce data exposure tied to Salesloft Drift compromise amid wider Salesforce breach activity
Zscaler confirms a data breach tied to the Salesloft Drift supply-chain attack, exposing customer Salesforce data due to compromised Drift credentials. The company revoked Drift integrations, rotated tokens, and reinforced customer authentication while investigations continue; Google Threat Intelligence links UNC6395 to the broader campaign affecting Salesforce environments.
-
ZipLine phishing campaign uses public contact forms to drop in-memory MixShell malware, researchers say
Cybersecurity researchers warn of ZipLine, a social-engineering campaign that uses public-facing Contact Us forms to seed weeks-long conversations before delivering in-memory MixShell malware via a weaponized ZIP file, with DNS tunneling as the primary command-and-control channel.
-
Workday says data breach tied to Salesforce-related social engineering campaign, broader breach wave observed
Workday disclosed a data breach after attackers gained access to a third-party CRM platform via a social engineering campaign. While customer tenants were not affected, some business contact information was exposed. The incident appears linked to a broader Salesforce data-theft campaign attributed to the ShinyHunters group, with Workday noting the discovery on August 6.
-
Cybercrime Group Scattered Spider Targets VMware ESXi in Coordinated Attacks
Scattered Spider has intensified its attacks against VMware ESXi hypervisors in North America, employing advanced social engineering tactics that pose an acute risk to critical infrastructure. Google’s Mandiant team warns that organizations must adopt proactive security measures to defend against these targeted attacks.
-
Cybersecurity Researchers Uncover Advanced Matanbuchus 3.0 Malware Targeting Microsoft Teams
Cybersecurity experts have identified a new variant of the Matanbuchus malware that exploits Microsoft Teams. This advanced loader has sophisticated stealth capabilities, enhancing its potential for evading detection and targeting company employees through social engineering tactics.
-
Russian Hackers Employ Advanced Social Engineering to Bypass Gmail’s Multi-Factor Authentication
A new campaign by Russian hackers has successfully bypassed Gmail’s multi-factor authentication, targeting academics and critics of Russia through sophisticated social engineering attacks, as reported by Google Threat Intelligence Group.
-
Cyber Attack on UK Retailers Marks & Spencer and Co-op Attributed to Scattered Spider Group
The recent cyber attacks targeting UK retailers Marks & Spencer and Co-op have been linked to the Scattered Spider cybercrime group, with financial impacts estimated at up to £440 million. The UK’s Cyber Monitoring Centre described the incidents as a single combined cyber event, prompting heightened concerns in the insurance sector as the group shifts…