BTC $63839.7374
ETH $3215.9525
BNB $592.7666
SOL $137.7354
stETH $3213.8279
XRP $0.5153
DOGE $0.1435
TON $5.3079
ADA $0.4573
AVAX $35.3773
wstETH $3745.4474
TRX $0.1190
WETH $3216.2721
WBTC $63848.3202
DOT $6.5922
BCH $465.4154
LINK $14.0722
MATIC $0.7048
UNI $7.6998
ICP $13.4394
LTC $83.5667
DAI $1.0017
CAKE $2.6983
FDUSD $1.0001
RNDR $7.8822
IMX $2.0991
NEAR $6.8678
ETC $27.5797
HBAR $0.1032
STX $2.4625
MNT $1.0422
FIL $5.9224
OKB $51.6991
PEPE $0.0000
VET $0.0395
WIF $2.7703
TAO $404.6252
ATOM $8.1544
KAS $0.1134
MKR $2837.9004
GRT $0.2566
FET $2.1678
XMR $128.9461
AR $36.0664
USDE $0.9983
INJ $25.8592
XLM $0.1121
BTC $63839.7374
ETH $3215.9525
BNB $592.7666
SOL $137.7354
stETH $3213.8279
XRP $0.5153
DOGE $0.1435
TON $5.3079
ADA $0.4573
AVAX $35.3773
wstETH $3745.4474
TRX $0.1190
WETH $3216.2721
WBTC $63848.3202
DOT $6.5922
BCH $465.4154
LINK $14.0722
MATIC $0.7048
UNI $7.6998
ICP $13.4394
LTC $83.5667
DAI $1.0017
CAKE $2.6983
FDUSD $1.0001
RNDR $7.8822
IMX $2.0991
NEAR $6.8678
ETC $27.5797
HBAR $0.1032
STX $2.4625
MNT $1.0422
FIL $5.9224
OKB $51.6991
PEPE $0.0000
VET $0.0395
WIF $2.7703
TAO $404.6252
ATOM $8.1544
KAS $0.1134
MKR $2837.9004
GRT $0.2566
FET $2.1678
XMR $128.9461
AR $36.0664
USDE $0.9983
INJ $25.8592
XLM $0.1121
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals are always one step ahead of the law: malicious neural networks and phony call centers

    Cybercriminals are increasingly using sophisticated social engineering techniques and new types of fraud to trick online users, according to a study by Positive Technologies. Social engineering preys on victims' emotional vulnerabilities and trusting natures, with 92% of respondents and 37% of attack groups concerned about this. In Q3 2023, attackers targeted individuals through social networking sites (19%), instant messaging platforms (16%), and email (27%). Global statistics show that cybercriminals are increasingly using attachments with the.pdf extension to bypass email security systems, hiding malicious links within PDF files under QR codes.

    Phishing attacks have been carried out by cybercriminals using platforms that provide the means to do so. One such service, EvilProxy, launched a global campaign against the upper echelons of over a hundred companies, with 65% of the victims being executives. A new fraudulent scheme was identified at a bank in South Korea, using the Letscall toolkit, which employs both phishing websites and voice fraud (vishing) in its arsenal of deception techniques.

    Cybersecurity professionals advise always exercising caution online and never downloading files or opening links from unknown senders. They also foresee a rise in attacks that use neural networks, which are steadily growing the attackers' toolkit. One such malicious application is WormGPT, a generative neural network for phishing and BEC attacks based on the publicly available JPT-J language model. It allows even a novice attacker to carry out sustained attacks that allow for meaningful correspondence in any language and automate the creation of convincing fake emails.

    Author reign3d
    How To Protect Your PC From Leaks
    Cyber Exploitation: The Dark Side of the Ukrainian Crisis

    Comments 0

    Add comment