North Korean hackers use a sophisticated version of social engineering to dupe cybersecurity researchers and CISA warns against letting your cyber heart get broken this Valentine’s Day.
Panelists
Related Stories
North Korea targeted cybersecurity researchers using a blend of hacking and espionage Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it. Read in The Conversation US
If you don’t know who you are doting on when you are dating, be cautious with your cash and keep it.
For more information, review CISA’s Tip on Staying Safe on Social Networking Sites. If you believe you have been a victim of a romance scam, file a report with:
Subscribe: Apple Podcasts | Android | Google Podcasts | Stitcher | TuneIn | RSS
Ranked #1 in Malware Protection, Exploit Protection, Security Effectiveness, and Total Cost of Ownership, VLCM and Intercept X will protect your most vital information.
Over 12 billion dollars has been lost to spear phishing and account takeover. Target attacks carry no malicious payload and are able to bypass email gateways.
Barracuda Sentinel uses AI to outsmart the attackers and protect your business and data.
With Barracuda Sentinel, you can block threats that are already in your inbox (not just the incoming ones), you can stay a step ahead of attackers with AI-based threat detection, and you can stop wasting time managing static security rules with this silent, zero-administration tool.
CYBER24 is a podcast and website designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We talk with experts who share their knowledge in an easily understandable formate designed to arm public and private sector leaders with the information they need to protect their organization.
VLCM’s Cybersecurity Team offers leading industry expertise to design, implement, and support the right cybersecurity solutions. VLCM’S Cybersecurity architects Get IT Right by implementing layered security strategies, and partner with a wide range of industry-leading IT security vendors to develop the best cybersecurity defense for your unique organization.