Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎭 Social Engineering
phishing, pretexting, vishing, human hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187080
posts in
22.2
ms
AI-Augmented
Social Engineering: When Trust
Becomes
a Control-Plane Risk
🕵️
Threat Intelligence
zenodo.org
·
5d
·
Hacker News
"
AccountDumpling
" – The Google-Sent Phishing Wave Hijacking
30k
Facebook Accounts
💥
Cyberattack
guard.io
·
18h
·
Hacker News
'This campaign works because it feels ordinary': Experts reveal how hackers use fake
DHL
messages to
lure
in victims
🕵️
Hacking
techradar.com
·
1d
Bot her emails: most modern
phishing
campaigns
are AI-enabled
💥
Cyberattack
theregister.com
·
5h
When
Phishing
Stops
Looking Like
Phishing
🔓
Penetration Testing
macsparky.com
·
12h
PhySE
: A
Psychological
Framework for Real-Time AR-LLM Social Engineering Attacks
🕵️
Threat Intelligence
arxiv.org
·
2d
Why
Phishing
Still Works (Even If You Know About It)
🌐
Web App Security
infosecwriteups.com
·
4d
Phishing
is no longer human as AI now drives 86
percent
of attacks
🦠
Malware Analysis
nerds.xyz
·
12h
·
r/netsec
Hackers
Pose
as Microsoft Support to Breach Corporate
Defenses
💥
Cyber Attacks
pymnts.com
·
2d
Training on
Fiction
While the Real Threat is in Your
Inbox
📡
Network Security
cofense.com
·
21h
Don’t Click That Link: How Hackers Used
Robinhood
’s Own Systems to
Fool
and Target Customers
💥
Cyberattack
inc.com
·
2d
However
,
sophisticated
attackers have engaged in a harmful phishing campaign, posing as “Signal Support” by changing their profile display name and using soc...
🕵️
Hacking
mastodon.world
·
3d
CySecurity
News - Latest Information Security and Hacking Incidents: Fake Court
Summons
And Survey Scams Surge As Regions Bank Warns Of Rising Consumer Fraud Risks
📡
Network Security
cysecurity.news
·
8h
·
Blogger
Your Voice Just Sold You Out: The 3-Second
Clone
That
Walked
Into Axios
🔓
Penetration Testing
caracomp.com
·
1d
·
DEV
Report
sheds
light on Chinese phishing
campaigns
against journalists, activists | brief
🔬
Security Research
scworld.com
·
10h
How
UNC6692
Employed
Social Engineering to Deploy a Custom Malware Suite
🔓
Penetration Testing
sh.itjust.works
·
6d
The world's first platform for Social Engineering Defense.
🕵️
Threat Intelligence
doppel.com
·
2d
Cybersecurity Tools
Combating
Phishing
Attacks
📡
Network Security
medium.com
·
13h
New
DHL
Phishing Scam Uses 11-Step Attack Chain to Steal
Passwords
🔐
Cryptography
hackread.com
·
2d
How the
Booking
Phishing Campaign Works and What
Defenders
Should Watch For
🌐
Web App Security
malware.news
·
18h
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help