BTC $111720.1928
ETH $2664.8884
XRP $2.4323
BNB $686.6222
SOL $179.7637
DOGE $0.2454
ADA $0.8092
TRX $0.2758
stETH $2659.8945
WBTC $111392.1304
SUI $3.8835
HYPE $33.4081
wstETH $3203.9944
LINK $16.7405
AVAX $25.2611
XLM $0.3042
BCH $444.3313
USDS $1.0019
HBAR $0.2048
LEO $8.9139
TON $3.1744
DOT $4.9486
LTC $100.3103
WETH $2662.6576
XMR $386.3069
PEPE $0.0000
BGB $5.2389
weETH $2841.9608
BSC-USD $0.9977
PI $0.8276
BTCB $111413.4856
WBT $31.8405
USDE $1.0006
TAO $465.7540
AAVE $256.9907
NEAR $3.0759
UNI $6.4302
APT $5.7097
DAI $0.9998
ONDO $1.0194
OKB $52.7871
KAS $0.1173
ICP $5.6945
CBBTC $111681.1951
CRO $0.1004
ETC $19.6976
TRUMP $14.7330
BTC $111720.1928
ETH $2664.8884
XRP $2.4323
BNB $686.6222
SOL $179.7637
DOGE $0.2454
ADA $0.8092
TRX $0.2758
stETH $2659.8945
WBTC $111392.1304
SUI $3.8835
HYPE $33.4081
wstETH $3203.9944
LINK $16.7405
AVAX $25.2611
XLM $0.3042
BCH $444.3313
USDS $1.0019
HBAR $0.2048
LEO $8.9139
TON $3.1744
DOT $4.9486
LTC $100.3103
WETH $2662.6576
XMR $386.3069
PEPE $0.0000
BGB $5.2389
weETH $2841.9608
BSC-USD $0.9977
PI $0.8276
BTCB $111413.4856
WBT $31.8405
USDE $1.0006
TAO $465.7540
AAVE $256.9907
NEAR $3.0759
UNI $6.4302
APT $5.7097
DAI $0.9998
ONDO $1.0194
OKB $52.7871
KAS $0.1173
ICP $5.6945
CBBTC $111681.1951
CRO $0.1004
ETC $19.6976
TRUMP $14.7330
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals are always one step ahead of the law: malicious neural networks and phony call centers

    Cybercriminals are increasingly using sophisticated social engineering techniques and new types of fraud to trick online users, according to a study by Positive Technologies. Social engineering preys on victims' emotional vulnerabilities and trusting natures, with 92% of respondents and 37% of attack groups concerned about this. In Q3 2023, attackers targeted individuals through social networking sites (19%), instant messaging platforms (16%), and email (27%). Global statistics show that cybercriminals are increasingly using attachments with the.pdf extension to bypass email security systems, hiding malicious links within PDF files under QR codes.

    Phishing attacks have been carried out by cybercriminals using platforms that provide the means to do so. One such service, EvilProxy, launched a global campaign against the upper echelons of over a hundred companies, with 65% of the victims being executives. A new fraudulent scheme was identified at a bank in South Korea, using the Letscall toolkit, which employs both phishing websites and voice fraud (vishing) in its arsenal of deception techniques.

    Cybersecurity professionals advise always exercising caution online and never downloading files or opening links from unknown senders. They also foresee a rise in attacks that use neural networks, which are steadily growing the attackers' toolkit. One such malicious application is WormGPT, a generative neural network for phishing and BEC attacks based on the publicly available JPT-J language model. It allows even a novice attacker to carry out sustained attacks that allow for meaningful correspondence in any language and automate the creation of convincing fake emails.

    Author reign3d
    How To Protect Your PC From Leaks
    Cyber Exploitation: The Dark Side of the Ukrainian Crisis

    Comments 0

    Add comment