BTC $103974.9800
ETH $2477.1493
XRP $2.1525
BNB $647.0139
SOL $149.3085
DOGE $0.1777
TRX $0.2785
ADA $0.6507
stETH $2473.7170
WBTC $103761.1125
HYPE $34.4530
SUI $3.0990
wstETH $2981.3492
USDS $0.9998
LINK $13.2160
LEO $8.9174
XLM $0.2624
AVAX $19.3706
TON $3.1477
BCH $385.9709
HBAR $0.1647
WETH $2481.0454
LTC $84.6231
weETH $2649.6102
DOT $3.9117
XMR $325.0149
BSC-USD $0.9982
BGB $4.6253
BTCB $103709.1336
WBT $31.3519
USDE $1.0011
PEPE $0.0000
PI $0.6165
AAVE $250.4000
UNI $6.0248
sUSDe $1.1775
DAI $0.9998
TAO $369.3858
OKB $50.3037
CRO $0.0988
APT $4.6045
CBBTC $104088.8421
NEAR $2.2898
ICP $4.9851
ONDO $0.8042
ETC $16.5713
JITOSOL $180.2527
BTC $103974.9800
ETH $2477.1493
XRP $2.1525
BNB $647.0139
SOL $149.3085
DOGE $0.1777
TRX $0.2785
ADA $0.6507
stETH $2473.7170
WBTC $103761.1125
HYPE $34.4530
SUI $3.0990
wstETH $2981.3492
USDS $0.9998
LINK $13.2160
LEO $8.9174
XLM $0.2624
AVAX $19.3706
TON $3.1477
BCH $385.9709
HBAR $0.1647
WETH $2481.0454
LTC $84.6231
weETH $2649.6102
DOT $3.9117
XMR $325.0149
BSC-USD $0.9982
BGB $4.6253
BTCB $103709.1336
WBT $31.3519
USDE $1.0011
PEPE $0.0000
PI $0.6165
AAVE $250.4000
UNI $6.0248
sUSDe $1.1775
DAI $0.9998
TAO $369.3858
OKB $50.3037
CRO $0.0988
APT $4.6045
CBBTC $104088.8421
NEAR $2.2898
ICP $4.9851
ONDO $0.8042
ETC $16.5713
JITOSOL $180.2527
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals are always one step ahead of the law: malicious neural networks and phony call centers

    Cybercriminals are increasingly using sophisticated social engineering techniques and new types of fraud to trick online users, according to a study by Positive Technologies. Social engineering preys on victims' emotional vulnerabilities and trusting natures, with 92% of respondents and 37% of attack groups concerned about this. In Q3 2023, attackers targeted individuals through social networking sites (19%), instant messaging platforms (16%), and email (27%). Global statistics show that cybercriminals are increasingly using attachments with the.pdf extension to bypass email security systems, hiding malicious links within PDF files under QR codes.

    Phishing attacks have been carried out by cybercriminals using platforms that provide the means to do so. One such service, EvilProxy, launched a global campaign against the upper echelons of over a hundred companies, with 65% of the victims being executives. A new fraudulent scheme was identified at a bank in South Korea, using the Letscall toolkit, which employs both phishing websites and voice fraud (vishing) in its arsenal of deception techniques.

    Cybersecurity professionals advise always exercising caution online and never downloading files or opening links from unknown senders. They also foresee a rise in attacks that use neural networks, which are steadily growing the attackers' toolkit. One such malicious application is WormGPT, a generative neural network for phishing and BEC attacks based on the publicly available JPT-J language model. It allows even a novice attacker to carry out sustained attacks that allow for meaningful correspondence in any language and automate the creation of convincing fake emails.

    Author reign3d
    How To Protect Your PC From Leaks
    Cyber Exploitation: The Dark Side of the Ukrainian Crisis

    Comments 0

    Add comment