social-engineering

Preview image for: Unpacking Advanced Persistent Threats: A Deep Dive into ISC Stormcast 9834 Insights

Unpacking Advanced Persistent Threats: A Deep Dive into ISC Stormcast 9834 Insights

Analyzing ISC Stormcast 9834: Advanced persistent threats, sophisticated social engineering, and critical incident response strategies for modern cyber defense.
Preview image for: Havoc C2 Unleashed: Fake Tech Support Scam Targets Organizations with Custom Malware

Havoc C2 Unleashed: Fake Tech Support Scam Targets Organizations with Custom Malware

New campaign leverages fake IT support and social engineering to deploy customized Havoc C2, preceding data exfiltration or ransomware.
Preview image for: Phishing Deception: When Your 'Purchase Order PDF' Is a Credential Harvester

Phishing Deception: When Your 'Purchase Order PDF' Is a Credential Harvester

Unmasking a sophisticated phishing attack where fake purchase order attachments are HTML credential harvesting pages.
Preview image for: Beyond Malware: Fake Zoom/Google Meet Scams Deploy Teramind for Covert Surveillance and Data Exfiltration

Beyond Malware: Fake Zoom/Google Meet Scams Deploy Teramind for Covert Surveillance and Data Exfiltration

Deep dive into fake Zoom/Google Meet scams installing Teramind, a legitimate tool turned covert surveillance weapon for data exfiltration.
Preview image for: Exploiting Preorder Lures: A Cyber Threat Analysis of the Galaxy S26 Best Buy Deal

Exploiting Preorder Lures: A Cyber Threat Analysis of the Galaxy S26 Best Buy Deal

Investigate Galaxy S26 preorder deal cyber threats, phishing vectors, OSINT, and defensive strategies for researchers.
Preview image for: ClawHub Under Siege: Sophisticated Infostealer Campaign Leverages Deceptive Troubleshooting Comments

ClawHub Under Siege: Sophisticated Infostealer Campaign Leverages Deceptive Troubleshooting Comments

A new infostealer campaign targets ClawHub users via malicious troubleshooting comments, bypassing traditional skill-based defenses with social engineering.
Preview image for: AI-Augmented Adversaries: Financially Motivated Group Compromises 600+ FortiGate Devices Globally

AI-Augmented Adversaries: Financially Motivated Group Compromises 600+ FortiGate Devices Globally

An AI-assisted Russian-speaking threat actor compromised over 600 FortiGate devices in 55 countries, leveraging commercial generative AI.
Preview image for: Algorithmic Bias in LLMs: Unmasking the Unequal Responses Based on User Demographics

Algorithmic Bias in LLMs: Unmasking the Unequal Responses Based on User Demographics

LLMs exhibit significant response disparities based on perceived user attributes, affecting accuracy and tone.
Preview image for: Advanced Japanese-Language Phishing Campaigns: A Deep Dive into Evolving Threat Vectors (Sat, Feb 21st)

Advanced Japanese-Language Phishing Campaigns: A Deep Dive into Evolving Threat Vectors (Sat, Feb 21st)

Technical analysis of sophisticated Japanese-language phishing, covering social engineering, attack vectors, and advanced defensive strategies observed on Sat, Feb 21st.
Preview image for: Deconstructing the Deception: A Technical Analysis of a Fake Incident Report Phishing Campaign (Feb 17th)

Deconstructing the Deception: A Technical Analysis of a Fake Incident Report Phishing Campaign (Feb 17th)

Deep dive into a recent phishing campaign leveraging fake incident reports to exploit trust and harvest credentials. Explore TTPs, forensic analysis, and mitigation.
Preview image for: North Korea's UNC1069 Leverages AI-Enhanced Lures in Sophisticated Cryptocurrency Heists

North Korea's UNC1069 Leverages AI-Enhanced Lures in Sophisticated Cryptocurrency Heists

UNC1069, a North Korea-linked APT, targets crypto organizations with AI-powered social engineering, exploiting Windows/macOS for financial theft.
Preview image for: Vishing for Victory: Deconstructing the Advanced Apple Pay Phishing Campaign Exploiting Fake Support Calls

Vishing for Victory: Deconstructing the Advanced Apple Pay Phishing Campaign Exploiting Fake Support Calls

Sophisticated Apple Pay phishing combines digital lures with fake support calls to exfiltrate sensitive payment data.
Preview image for: The SLSH Menace: Unmasking the Aggressive Tactics of Scattered Lapsus ShinyHunters

The SLSH Menace: Unmasking the Aggressive Tactics of Scattered Lapsus ShinyHunters

Analyzing Scattered Lapsus ShinyHunters' aggressive data extortion, harassment, and swatting tactics, and outlining robust defensive strategies.
Preview image for: Attackers Harvest Dropbox Logins Via Fake PDF Lures: A Deep Dive into Corporate Phishing

Attackers Harvest Dropbox Logins Via Fake PDF Lures: A Deep Dive into Corporate Phishing

Analyzing a malware-free phishing campaign leveraging fake PDF "request orders" to steal corporate Dropbox credentials.
Preview image for: ISC Stormcast 9790: AI-Driven Phishing & Covert Exfiltration - The 2026 Threat Landscape

ISC Stormcast 9790: AI-Driven Phishing & Covert Exfiltration - The 2026 Threat Landscape

Analyzing advanced AI phishing, social engineering, and covert data exfiltration methods discussed in ISC Stormcast 9790.
Preview image for: Weaponizing Trust: Google Presentations Exploited in Vivaldi Webmail Phishing Campaign

Weaponizing Trust: Google Presentations Exploited in Vivaldi Webmail Phishing Campaign

Attackers leverage Google Presentations for phishing Vivaldi Webmail users, bypassing security and harvesting credentials via trusted domains.
Preview image for: ISC Stormcast: Navigating 2026's Evasive Phishing & Advanced Reconnaissance

ISC Stormcast: Navigating 2026's Evasive Phishing & Advanced Reconnaissance

Analysis of the Jan 28, 2026 Stormcast: sophisticated phishing, IP logger reconnaissance, and vital defensive strategies.
Preview image for: Deceptive Beginnings: Unmasking the Initial Stages of Romance Scams

Deceptive Beginnings: Unmasking the Initial Stages of Romance Scams

Explores the initial tactics of romance scammers, from contact to reconnaissance, leveraging social engineering and tools like iplogger.org.
Preview image for: ISC Stormcast Review: Navigating the Evolving Phishing Landscape of Early 2026

ISC Stormcast Review: Navigating the Evolving Phishing Landscape of Early 2026

Analyzing the ISC Stormcast from Jan 26, 2026, focusing on advanced phishing, supply chain threats, and crucial defenses.
Preview image for: Multi-Stage Phishing Unleashes Amnesia RAT and Ransomware on Russian Targets

Multi-Stage Phishing Unleashes Amnesia RAT and Ransomware on Russian Targets

Sophisticated multi-stage phishing campaign targets Russia with Amnesia RAT and ransomware, exploiting business-themed lures for data theft and encryption.
Preview image for: Phishing Alert: LastPass Users Under Siege by Sophisticated Maintenance Email Scams

Phishing Alert: LastPass Users Under Siege by Sophisticated Maintenance Email Scams

LastPass warns users of urgent phishing emails demanding vault backups within 24 hours, leading to credential theft.
Preview image for: Phishing and Spoofed Sites: The Primary Digital Threat to Milano-Cortina 2026 Winter Games

Phishing and Spoofed Sites: The Primary Digital Threat to Milano-Cortina 2026 Winter Games

Milano-Cortina 2026 Winter Games face significant cyber risks, with phishing and spoofed websites emerging as key entry points for attackers.
Preview image for: CrashFix Scam: Unpacking the Browser Crash, Malicious Extension, and Python RAT Threat

CrashFix Scam: Unpacking the Browser Crash, Malicious Extension, and Python RAT Threat

Analyzing the multi-stage CrashFix scam, involving deceptive browser crashes, NexShield extension, and a potent Python RAT.
Preview image for: ISC Stormcast: Navigating the 2026 Horizon of AI-Enhanced Phishing and Evasive Attack Vectors

ISC Stormcast: Navigating the 2026 Horizon of AI-Enhanced Phishing and Evasive Attack Vectors

Analyzing the ISC Stormcast for January 20, 2026, focusing on advanced AI-driven phishing and sophisticated social engineering tactics.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics