TechDay US - America's technology news network

Social Engineering stories - Page 4

It service desk agent biometric facial scan secure auth workflow

1Kosmos adds identity checks to ServiceNow AI workflows

Last month
#
uc
#
surveillance
#
biometrics
1Kosmos adds embedded identity checks to ServiceNow AI workflows to curb social engineering in high-risk service desk interactions.
Msp office night glowing server chains masked hackers apac eu

MSPs warned as cyber criminals weaponise trusted access

Last month
#
firewalls
#
dr
#
ransomware
Cyber criminals are hijacking MSP trust relationships, abusing valid credentials and VPNs as AI turbocharges phishing and ransomware.
Overwhelmed security analyst shadowy cyber threats night office

AI cyber threats outpace staff readiness, report warns

Last month
#
firewalls
#
data protection
#
digital transformation
Attackers' AI use is surging faster than staff skills, Fortinet warns, leaving firms exposed despite rising security awareness spending.
Hooded cyber figure identity attack breached accounts blue tones

Identity attacks dominate Expel's 2026 threat report

Last month
#
malware
#
endpoint protection
#
mfa
Identity-based attacks drove nearly 70% of incidents in Expel's 2026 threat report, exposing gaps between basic controls and real-world defence.
Cybersecurity ops room female leader collaborative team risk mgmt

Women call for visibility & voice in cybersecurity

Last month
#
risk & compliance
#
cybersecurity
#
recruitment
Women in cybersecurity demand real visibility and inclusion, warning that lack of female voices skews risk, products and leadership decisions.
Bd jade brown

Why cybersecurity needs women from non-tech careers

Last month
#
ransomware
#
devops
#
advanced persistent threat protection
Cybersecurity is missing vital human insight; drawing in women and non‑STEM talent could close both the threat and perspective gaps.
Office worker ai cyberattack popups warning icons shadowy web

HP warns of AI-fuelled 'flat-pack' cyberattacks surge

Last month
#
malware
#
uc
#
phishing
HP reports a surge in AI-powered “flat-pack” cyberattacks as criminals trade sophistication for speed, low cost and mass customisation.
Account takeover featured image 1200x628

Account Takeover (ATO) fraud: The hidden threat to your business and how to stop it

Last month
#
malware
#
data protection
#
surveillance
Silent account takeover fraud is draining billions as criminals hijack real identities; here's how businesses can finally fight back.
Cinematic cloud server room ai identity theft masked attackers

Cloudflare flags AI-fuelled identity & SaaS attacks

Last month
#
saas
#
firewalls
#
ddos
Cloudflare warns AI-driven identity fraud and SaaS abuse are reshaping cybercrime, as global costs hit USD $10.5 trillion a year.
Secure cloud shield infrastructure filtering data stream icons

Proofpoint adds threat defence to AWS Security Hub plan

Last month
#
ransomware
#
digital transformation
#
hyperscale
Proofpoint plugs Collaboration Protection into AWS Security Hub Extended Plan, folding email and collaboration threat defence into one AWS deal.
Business pro using fingerprint phone shield biometric mfa secure

CrowdStrike unveils FalconID to combat AI-driven phishing

Last month
#
pam
#
mfa
#
cloud security
CrowdStrike launches FalconID, a “zero-friction” biometric MFA tool that binds logins to trusted devices to counter AI-powered phishing.
Moody globe of network cables with hidden red cyber threat nodes

Phishing gangs weaponise .arpa DNS to evade defences

Fri, 27th Feb 2026
#
firewalls
#
network infrastructure
#
network security
Phishing gangs abuse .arpa DNS and IPv6 tunnels to hide brand-impersonation scams in core internet plumbing that most defences ignore.
Ransomware threat dark server room to critical infrastructure art

NCC warns ransomware risk persists despite January dip

Fri, 27th Feb 2026
#
ransomware
#
manufacturing
#
digital transformation
Ransomware cases dipped 17% in January, but NCC warns the threat remains high as Qilin targets critical sectors and tactics evolve.
Moody businessperson faces split deepfake screen ai security threats

AI tops data security worries as identity risks surge

Fri, 27th Feb 2026
#
data protection
#
digital transformation
#
encryption
AI has become firms' top data security fear as identity and deepfake threats surge, exposing gaps in visibility, encryption and governance.
Dim office ransomware laptop chat bubbles qr codes masked figures

Ransomware attacks dip but NCC warns threat evolving

Fri, 27th Feb 2026
#
data protection
#
ransomware
#
iot security
Global ransomware attacks fell 17% in January, but NCC warns evolving tactics, AI and messaging apps mean risk is not receding.
Secure cloud shields over server room with locks and email icons

Proofpoint joins AWS Security Hub Extended for email AI

Fri, 27th Feb 2026
#
data protection
#
ransomware
#
hyperscale
Proofpoint plugs its AI-powered email and collaboration security into AWS Security Hub Extended, promising simpler cloud procurement and defence.
Story 300075

OpenClaw AI assistant surge sparks major security fears

Fri, 27th Feb 2026
#
malware
#
phishing
#
application security
A rapid surge in OpenClaw AI assistant use has left tens of thousands of exposed systems and a trail of hijacked tools and malicious add-ons.
Smartphone suspicious call laptop fake login deceptive subdomain scene

ShinyHunters pivots to subdomain phishing & vishing

Fri, 27th Feb 2026
#
saas
#
mfa
#
cloud security
ShinyHunters shifts to subdomain-brand phishing and vishing on mobiles, bypassing domain checks to hijack SSO logins and SaaS sessions.
Dr. ren%c3%a9e burton infoblox 1

Phishing campaigns exploit .arpa DNS to evade filters

Fri, 27th Feb 2026
#
firewalls
#
network security
#
phishing
Phishing gangs exploit obscure .arpa DNS space and IPv6 tunnels to sneak past reputation-based web filters and lure users to fake sites.
Ai cyber attack hourglass binary lock cloud night office scene

AI-fuelled cyber attacks now steal data in 72 minutes

Fri, 27th Feb 2026
#
firewalls
#
pam
#
cloud security
AI-driven hackers can now steal data in just 72 minutes, as faster, multi-surface attacks overwhelm complex, over-trusting enterprises.