Tagged articles
21 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 20, 2026 · Information Security

How Apple’s Trusted Email System Was Exploited for Phishing Attacks

A sophisticated phishing campaign abused Apple’s account‑change notification template, injecting malicious content into a legitimately signed email, which bypassed SPF, DKIM and DMARC checks and achieved near‑100% delivery, while also evolving into a “telephone‑oriented” social‑engineering variant.

AppleDKIMDMARC
0 likes · 7 min read
How Apple’s Trusted Email System Was Exploited for Phishing Attacks
Code Mala Tang
Code Mala Tang
Apr 4, 2026 · Information Security

How AI‑Assisted Social Engineering Compromised the Popular Axios Module

A recent GitHub issue reveals that attackers used AI‑assisted social engineering—posing as a company founder, creating a fake Slack workspace, arranging Microsoft Teams meetings, and tricking the maintainer into installing a malicious npm package—to inject a trojan into the widely used Axios library, bypassing 2FA and publishing malicious code.

AIaxiosnpm security
0 likes · 3 min read
How AI‑Assisted Social Engineering Compromised the Popular Axios Module
Black & White Path
Black & White Path
Mar 28, 2026 · Information Security

Inside the FBI Director’s Email Hack: How Iranian Hackers Waged a Psychological War

The article examines the March 2026 breach of FBI Director Kash Patel’s personal Gmail by the Iranian Handala Hack Team, detailing the low‑tech social‑engineering tactics, the group’s strategic aim to embarrass and destabilize U.S. officials, historical precedents, defensive shortcomings, and potential future escalation.

FBI email breachInformation SecurityIranian hackers
0 likes · 8 min read
Inside the FBI Director’s Email Hack: How Iranian Hackers Waged a Psychological War
Black & White Path
Black & White Path
Mar 27, 2026 · Information Security

When Deepfakes Cost $25 Million: The End of Video‑Call Authentication

A 2025‑2026 deep‑fake attack on Arup’s finance team used publicly gathered intelligence to create a real‑time, AI‑generated video of the CFO and colleagues, resulting in a $25 million transfer and exposing the economic asymmetry that makes video‑call authentication unreliable, prompting a shift to multi‑channel, zero‑trust verification.

Identity verificationZero Trustdeepfake
0 likes · 28 min read
When Deepfakes Cost $25 Million: The End of Video‑Call Authentication
Black & White Path
Black & White Path
Mar 23, 2026 · Information Security

FBI Warns: Russian Hackers Launch Massive Phishing Attack on WhatsApp and Signal Users

The FBI and CISA have issued an urgent alert that Russian-linked threat actors are conducting large‑scale phishing campaigns against WhatsApp and Signal users, using social‑engineering tricks such as fake support messages, code‑request scams, and malicious links to hijack accounts and monitor communications.

FBIInformation SecurityWhatsApp
0 likes · 6 min read
FBI Warns: Russian Hackers Launch Massive Phishing Attack on WhatsApp and Signal Users
MaGe Linux Operations
MaGe Linux Operations
Mar 24, 2024 · Information Security

What Every Hacker Should Know: 27 Common Terms and Attack Techniques

This article provides a comprehensive glossary of 27 common hacking terms—from black‑hat and backdoor to zero‑day exploits and dark‑web concepts—explaining each technique, malware type, and security threat in clear, concise English for anyone interested in cybersecurity fundamentals.

APTExploitcybersecurity
0 likes · 18 min read
What Every Hacker Should Know: 27 Common Terms and Attack Techniques
Sohu Tech Products
Sohu Tech Products
Dec 20, 2023 · Information Security

Understanding Self‑XSS Warnings in Chrome DevTools

Chrome DevTools now shows a Self‑XSS warning when an inexperienced user tries to paste code, using a simple heuristic that checks for at least five console‑history entries, requiring the user to type “allow pasting” before execution, to protect against social‑engineered attacks that could steal data or hijack accounts.

Browser WarningChrome DevToolsSelf-XSS
0 likes · 7 min read
Understanding Self‑XSS Warnings in Chrome DevTools
Architects Research Society
Architects Research Society
Oct 14, 2023 · Information Security

How Hackers Target the Personal Lives of Top Executives and How to Defend

The article explains how C‑suite executives become prime targets for hackers through data broker profiles, insecure home networks, personal accounts, ransomware, and family members, and provides practical steps to reduce their personal attack surface and improve overall security.

C-suite securityhome network securitypersonal data protection
0 likes · 14 min read
How Hackers Target the Personal Lives of Top Executives and How to Defend
21CTO
21CTO
Jul 20, 2023 · Information Security

Kevin Mitnick: From World’s Most Wanted Hacker to Security Guru

Kevin Mitnick, once dubbed the world’s most famous hacker and the first to be pursued by the FBI, transformed from a teenage social‑engineering prodigy into a celebrated information‑security consultant, author, and founder of Mitnick Security, leaving a lasting impact on computer security after his 2023 death.

Information SecurityKevin Mitnickcomputer security
0 likes · 5 min read
Kevin Mitnick: From World’s Most Wanted Hacker to Security Guru
Open Source Linux
Open Source Linux
Apr 15, 2023 · Information Security

Understanding Phishing: Types, Tactics, and Prevention Strategies

This article explains how phishing exploits human psychology, outlines common phishing variants such as email, spear, whaling, business email compromise, smishing, vishing, social‑media, pharming and evil‑twin attacks, and provides practical measures to recognize and defend against them.

Information Securitycyberattack preventionemail security
0 likes · 10 min read
Understanding Phishing: Types, Tactics, and Prevention Strategies
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Phishing Techniques: Theory, Classification, and Defense Strategies

The article provides a comprehensive overview of phishing as a social‑engineering attack, detailing its various techniques—including email deception, spear‑phishing, whaling, malware‑based lures, domain spoofing, vishing, SMS and QR‑code scams—and offers practical defense measures such as anti‑phishing tools, multi‑factor authentication, content filtering, and security standards.

Defense Strategiesemail securitymalware
0 likes · 14 min read
Phishing Techniques: Theory, Classification, and Defense Strategies
MaGe Linux Operations
MaGe Linux Operations
Jul 28, 2022 · Information Security

GoodWill Ransomware Forces Victims to Do Good Deeds – How It Works

GoodWill ransomware, discovered by CloudSEK in Mumbai, encrypts all files and demands victims complete three charitable acts and post a personal essay on social media before providing a decryption key, blending malware tactics with forced philanthropy while employing .NET, UPX packing, AES encryption, and location detection.

GoodWillInformation Securitycybersecurity
0 likes · 6 min read
GoodWill Ransomware Forces Victims to Do Good Deeds – How It Works
MaGe Linux Operations
MaGe Linux Operations
Jul 24, 2022 · Information Security

When Ransomware Demands Good Deeds: Inside the GoodWill Malware

The GoodWill ransomware, discovered by CloudSEK in Mumbai, forces victims to perform three charitable acts, document them, and post a personal essay before providing a decryption key, while employing .NET, UPX packing, AES encryption, and location‑tracking techniques.

GoodWillcybersecuritymalware analysis
0 likes · 6 min read
When Ransomware Demands Good Deeds: Inside the GoodWill Malware
Open Source Linux
Open Source Linux
Jun 26, 2022 · Information Security

GoodWill Ransomware: When Hackers Demand Charity Instead of Money

The GoodWill ransomware, discovered by CloudSEK, encrypts victims' files and demands they perform three charitable acts—helping the homeless, feeding poor children, and financially assisting patients—while recording the process, revealing a bizarre blend of extortion and social engineering.

GoodWillcybersecurityransomware
0 likes · 7 min read
GoodWill Ransomware: When Hackers Demand Charity Instead of Money
MaGe Linux Operations
MaGe Linux Operations
Oct 18, 2019 · Information Security

How I Traced a Gambling Site Operator Using OSINT Techniques

A detailed OSINT investigation reveals how a victim's plea led to uncovering a hidden gambling website, exposing its server location, associated accounts, personal identities, and ultimately forcing the operator to return the stolen funds and shut down the site.

OSINTcyber investigationsocial engineering
0 likes · 7 min read
How I Traced a Gambling Site Operator Using OSINT Techniques
ITPUB
ITPUB
Sep 2, 2016 · Information Security

How Attackers Fake Chrome’s Address Bar to Trick Users in Full‑Screen Phishing

The article explains a new Chrome‑targeted phishing method that uses fullscreen mode and a carefully placed JPEG image to mimic the browser’s address bar and pop‑up dialogs, detailing the technique, visual cues, and security implications for users and researchers.

Browser SecurityChromefull-screen attack
0 likes · 8 min read
How Attackers Fake Chrome’s Address Bar to Trick Users in Full‑Screen Phishing
21CTO
21CTO
Mar 20, 2016 · Information Security

7 Surprising Attack Techniques Hackers Use to Exploit Everyday Users

This article surveys seven modern hacking tricks—from fake Wi‑Fi hotspots and cookie theft to file‑name deception, path hijacking, hosts‑file redirection, watering‑hole attacks, and bait‑replacement—explaining how they work, why they succeed, and practical defenses for users and developers.

Information SecurityWeb Securitymalware
0 likes · 13 min read
7 Surprising Attack Techniques Hackers Use to Exploit Everyday Users