Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎭 Social Engineering
phishing, pretexting, vishing, human hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184118
posts in
108.5
ms
AI-Augmented
Social Engineering: When Trust
Becomes
a Control-Plane Risk
🕵️
Threat Intelligence
zenodo.org
·
4d
·
Hacker News
"
AccountDumpling
" – The Google-Sent Phishing Wave Hijacking
30k
Facebook Accounts
💥
Cyberattack
guard.io
·
7h
·
Hacker News
However
,
sophisticated
attackers have engaged in a harmful phishing campaign, posing as “Signal Support” by changing their profile display name and using soc...
🕵️
Hacking
mastodon.world
·
2d
When
Phishing
Stops
Looking Like
Phishing
🔓
Penetration Testing
macsparky.com
·
1h
Phishing
is no longer human as AI now drives 86
percent
of attacks
🦠
Malware Analysis
nerds.xyz
·
1h
·
r/netsec
PhySE
: A
Psychological
Framework for Real-Time AR-LLM Social Engineering Attacks
🕵️
Threat Intelligence
arxiv.org
·
2d
'This campaign works because it feels ordinary': Experts reveal how hackers use fake
DHL
messages to
lure
in victims
🕵️
Hacking
techradar.com
·
21h
Why
Phishing
Still Works (Even If You Know About It)
🌐
Web App Security
infosecwriteups.com
·
4d
Hackers
Pose
as Microsoft Support to Breach Corporate
Defenses
💥
Cyber Attacks
pymnts.com
·
1d
Training on
Fiction
While the Real Threat is in Your
Inbox
📡
Network Security
cofense.com
·
10h
Your Voice Just Sold You Out: The 3-Second
Clone
That
Walked
Into Axios
🔓
Penetration Testing
caracomp.com
·
22h
·
DEV
Cybersecurity Tools
Combating
Phishing
Attacks
📡
Network Security
medium.com
·
2h
Don’t Click That Link: How Hackers Used
Robinhood
’s Own Systems to
Fool
and Target Customers
💥
Cyberattack
inc.com
·
1d
Crime crew
impersonates
help desk,
abuses
Microsoft Teams to steal your data
💥
Cyberattack
theregister.com
·
5d
The latest
phishing
scam? Fake party
invitations
. Here's how to spot them.
💥
Cyberattack
ketv.com
·
20h
The world's first platform for Social Engineering Defense.
🕵️
Threat Intelligence
doppel.com
·
1d
Hackers Abuse
Robinhood
Signup
Process to Deliver Phishing Emails
💥
Cyberattack
techrepublic.com
·
19h
UNC6692
Impersonates
IT Helpdesk via Microsoft Teams to Deploy SNOW Malware
💥
Cyberattack
thehackernews.com
·
6d
Hackers got data on 5.5 million
ADT
customers by
phishing
, report says
🕵️
Hacking
mashable.com
·
2d
How the
Booking
Phishing Campaign Works and What
Defenders
Should Watch For
🌐
Web App Security
malware.news
·
7h
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help