Workflow
Social engineering
icon
Search documents
Meet your scammers; This is how they get you. | Erica Stanford | TEDxSt Albans
TEDx Talks· 2025-10-30 16:11
[Music] In 2020, a publisher reached out and asked me to write a book about crypto scams. I was flattered and thought, "How hard can this be?" So, turns out it's hard and takes a lot of research. But I'd been working in the industry for years by this point.My job is to advise on risks and scams. I'd read the scammers textbooks. I know scams.So, I figured at least I wouldn't fall for one. So, guess who did. And 4.2% 2 million people did in England and Wales last year.There's always been scams, but scams and ...
Part 2: Social engineering, malware, and the future of cybersecurity in AI
Google DeepMind· 2025-10-16 16:08
Cybersecurity Threats & Actors - Nation-state actors are primarily motivated by geopolitical aims and espionage, often engaging in offensive cyberattacks to support warfare or prepositioning for potential conflicts [5][6] - Subnation-state actors and some nation-state activities are financially motivated, commonly using ransomware attacks to steal and encrypt data, demanding cryptocurrency for its release [9][10] - A gray market exists for zero-day vulnerabilities, with buyers including companies equipping law enforcement and governments, with some vulnerabilities worth millions of dollars [12][14] - AI is exacerbating social engineering risks by enabling deep fakes, making phishing attacks more tailored and effective, such as cloning voices for ransom demands or impersonating executives for financial fraud [30][32][33] Vulnerability Disclosure & Mitigation - Project Zero introduced a 90-day disclosure timeline for vulnerabilities, compelling companies to prioritize security patches to prevent exploitation by malicious actors [19][20] - Governments have been known to deliberately withhold vulnerability information for exploitation purposes, as exemplified by the Eternal Blue case [24] - Healthcare and critical infrastructure sectors often struggle with patch management due to the risk of disrupting essential services, leading to long-term vulnerabilities [29] - Multi-factor authentication and pass keys are emerging as strong defenses against phishing and password-related attacks, enhancing security and user experience [37][39][40] AI & Agent Security - Risk-based authentication, enhanced by AI, assesses user behavior to determine trust levels and adjust security friction accordingly, such as requiring multi-factor authentication based on anomalous activity [43][46] - The rise of AI agents acting on behalf of humans introduces new security challenges, requiring careful consideration of agent identity, permissions, and potential for misuse [50][51] - Contextual integrity is crucial for training AI agents to respect privacy norms and avoid disclosing sensitive data inappropriately, necessitating mechanisms for agents to seek permission before sharing information [57][58][59]
Are Your Assets Safe? New Threats Revealed by Crystal Intelligence!
Cointelegraph· 2025-09-05 17:41
Crypto Scam Evolution & Impact - Crypto scams are evolving rapidly, with hundreds of millions of dollars in value stolen from users in the last 2-3 years [3] - Generative AI has significantly reduced the cost of persuasion, making scams easier to execute [4] - Industrial supply chains, such as pig butchering compounds, have turned fraud into shift work, amplifying the scale of scams [5] - Friction-free rails like mixers and cross-chain bridges facilitate money laundering, complicating law enforcement efforts [6] - Consumer fraud in the US exceeded $12 billion last year, highlighting the increasing scale of the problem [6] Countermeasures & Solutions - Education is the best defense against evolving scams, emphasizing the need for users to stay informed [1] - Crystal Intelligence focuses on adding the "why" and "who" to blockchain analysis, fusing blockchain flows with off-chain context to understand scam behavior [13] - Crystal's analytics aim to be human-oriented, helping victims and potential victims understand threats before it's too late [15] - Pattern recognition and mileage are crucial in spotting attacks, similar to how compliance officers identify suspicious activity [9][10] - Sim swaps are a long-standing threat that can compromise various accounts, often preceding crypto theft [20][21]
Allianz Data Breach Exposes Vulnerabilities Affecting Everyone
Forbes· 2025-08-10 18:50
Core Insights - Data breaches are increasingly common, with 5.5 billion user accounts compromised globally in the previous year, marking an 800% increase compared to 2024, and 2025 is projected to set a new record for breaches [2][3] Company-Specific Summary - Allianz Life experienced a data breach on July 16th due to a supply chain attack, where cybercriminals targeted a third-party company to access sensitive information [3] - The breach involved the personal information of Allianz Life's 1.4 million customers in the U.S., including names, addresses, birth dates, Social Security numbers, and insurance policy details [3][4] - The hacker impersonated an IT helpdesk employee to gain unauthorized access to Allianz's Salesforce CRM system, utilizing social engineering tactics [4][5] Industry-Wide Implications - Many companies rely on cloud services and external partners, which increases vulnerability to data breaches when employees are manipulated through social engineering [5] - Cybersecurity should not only focus on technical measures but also address human vulnerabilities through ongoing awareness programs and a zero trust policy [7] - Implementing dual-factor authentication and using AI tools to detect unusual behavior can enhance data protection [7] Personal Protection Measures - Individuals should limit the personal information shared with companies and consider freezing their credit to prevent identity theft [8][9] - Regular monitoring of credit reports is essential to detect signs of identity theft, with free weekly access now available from major credit reporting agencies [9] - Caution is advised against unsolicited communications regarding data breaches, as these can be tactics used by identity thieves [10]
Allianz Life says ‘majority' of customers' personal data stolen in cyberattack
TechCrunch· 2025-07-26 13:40
Core Points - Allianz Life confirmed a data breach in mid-July, where hackers stole personal information of the majority of its customers, financial professionals, and employees [1][2] - The breach occurred on July 16, 2025, through a third-party cloud-based CRM system, utilizing social engineering techniques [2][3] - Allianz Life has approximately 1.4 million customers, while its parent company Allianz has over 125 million customers globally [3] Company Response - Allianz Life disclosed the breach in a legally required filing with Maine's attorney general but did not specify the number of affected customers [3] - The company has notified the FBI and stated there is no evidence of other compromised systems within its network [3][4] - Allianz Life plans to begin notifying affected individuals around August 1 [6] Industry Context - Allianz Life is part of a recent wave of data breaches affecting the insurance industry, with other companies like Aflac also targeted [5] - Security researchers have linked these intrusions to a hacking group known as Scattered Spider, which employs social engineering techniques [5][6] - Prior to targeting the insurance sector, Scattered Spider had previously attacked the U.K. retail industry and other sectors [6]
How to change society in just a few handshakes | Andrei Lubalin | TEDxPodgorica
TEDx Talks· 2025-06-23 15:45
Core Idea: Social Re-engineering & Decentralized Cooperation - The report introduces a solution called "digital social innovation exodus" aimed at transforming hierarchical social structures into decentralized, mutual aid-based systems [4] - It emphasizes using an engineering approach, focusing on connections and interests, to address social problems without emotional bias [3] - The core innovation is a simple tool (described as an open-source "notebook") to illuminate existing social connections and facilitate cooperation [14][15] Key Principles & Examples of Self-Organization - Voluntary self-organization is crucial, contrasting with forced or hierarchical systems [6] - The report cites historical examples like the Montenegrin tradition of mutual assistance, the Jewish tradition of "avad," and a Chinese mutual aid platform (shut down by the government) as models [5][7][8] - These examples highlight the benefits of mutual assistance, such as increased security and sufficiency [7] Technology's Role & Limitations - Technology should serve existing social processes, not dictate them [9] - The idea that currency alone can bring prosperity is dismissed as ignorance; currency facilitates exchange, but doesn't create the underlying social dynamics [10] - The focus is on using technology to scale the benefits of existing self-organization methods [10] Network Structure & Potential - The system formalizes real relationships in a social graph, extending connections through six degrees of separation [16][17] - Initial participation of 50 friends can rapidly expand the network, potentially reaching 127,000 on the third handshake and 6.38 million on the fourth [18] - A fully connected graph could lead to 50.8 quadrillion potential cooperation connections [19] Functionality & Benefits - The system provides emergency mutual aid, regular support, crowdfunding initiatives, and direct cooperation through AI [21] - Participants can notify the network of needs, and others can voluntarily offer assistance [20] - AI can facilitate connections within the network, matching needs with individuals who have a reputation for helping others [22] Decentralization & Inevitability - The system is designed to be self-regulated and trustless [23] - The report claims a breakthrough law in graph theory suggests that organizing in this way will lead to an autocatalytic and inevitable emergence of a global social environment [24] - Direct cooperation within the network could reduce the need for fiat money, potentially leading to a "point npak" (inversion) where fiat money disappears [24]