BTC $104675.0655
ETH $2519.7374
XRP $2.1574
BNB $645.1350
SOL $145.1423
TRX $0.2752
DOGE $0.1701
stETH $2530.3024
ADA $0.5985
WBTC $104733.9464
HYPE $37.8832
wstETH $3042.7248
SUI $2.8051
BCH $459.6672
USDS $1.0002
LINK $13.1282
LEO $9.1465
WBT $49.2500
XLM $0.2508
ONDO $0.7796
AVAX $17.9134
TON $2.9226
WETH $2522.9092
weETH $2699.2068
LTC $84.9654
BSC-USD $0.9995
HBAR $0.1467
USDE $1.0012
XMR $316.0535
DOT $3.5719
BTCB $104659.7486
BGB $4.2823
UNI $7.7526
PEPE $0.0000
PI $0.5369
AAVE $259.9135
DAI $0.9999
sUSDe $1.1766
TAO $357.2062
OKB $52.6542
CBBTC $104738.8042
APT $4.4304
CRO $0.0907
ICP $5.0075
NEAR $2.1757
ETC $16.4882
JITOSOL $175.8488
BTC $104675.0655
ETH $2519.7374
XRP $2.1574
BNB $645.1350
SOL $145.1423
TRX $0.2752
DOGE $0.1701
stETH $2530.3024
ADA $0.5985
WBTC $104733.9464
HYPE $37.8832
wstETH $3042.7248
SUI $2.8051
BCH $459.6672
USDS $1.0002
LINK $13.1282
LEO $9.1465
WBT $49.2500
XLM $0.2508
ONDO $0.7796
AVAX $17.9134
TON $2.9226
WETH $2522.9092
weETH $2699.2068
LTC $84.9654
BSC-USD $0.9995
HBAR $0.1467
USDE $1.0012
XMR $316.0535
DOT $3.5719
BTCB $104659.7486
BGB $4.2823
UNI $7.7526
PEPE $0.0000
PI $0.5369
AAVE $259.9135
DAI $0.9999
sUSDe $1.1766
TAO $357.2062
OKB $52.6542
CBBTC $104738.8042
APT $4.4304
CRO $0.0907
ICP $5.0075
NEAR $2.1757
ETC $16.4882
JITOSOL $175.8488
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals are always one step ahead of the law: malicious neural networks and phony call centers

    Cybercriminals are increasingly using sophisticated social engineering techniques and new types of fraud to trick online users, according to a study by Positive Technologies. Social engineering preys on victims' emotional vulnerabilities and trusting natures, with 92% of respondents and 37% of attack groups concerned about this. In Q3 2023, attackers targeted individuals through social networking sites (19%), instant messaging platforms (16%), and email (27%). Global statistics show that cybercriminals are increasingly using attachments with the.pdf extension to bypass email security systems, hiding malicious links within PDF files under QR codes.

    Phishing attacks have been carried out by cybercriminals using platforms that provide the means to do so. One such service, EvilProxy, launched a global campaign against the upper echelons of over a hundred companies, with 65% of the victims being executives. A new fraudulent scheme was identified at a bank in South Korea, using the Letscall toolkit, which employs both phishing websites and voice fraud (vishing) in its arsenal of deception techniques.

    Cybersecurity professionals advise always exercising caution online and never downloading files or opening links from unknown senders. They also foresee a rise in attacks that use neural networks, which are steadily growing the attackers' toolkit. One such malicious application is WormGPT, a generative neural network for phishing and BEC attacks based on the publicly available JPT-J language model. It allows even a novice attacker to carry out sustained attacks that allow for meaningful correspondence in any language and automate the creation of convincing fake emails.

    Author reign3d
    How To Protect Your PC From Leaks
    Cyber Exploitation: The Dark Side of the Ukrainian Crisis

    Comments 0

    Add comment