IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, Unit 42

Data Is the New Diamond: Heists in the Digital Age

2025-08-27 01:08

Unit 42 explores the similarities between the social engineering and reconnaissance tactics used by financially motivated criminals.

The post Data Is the New Diamond: Heists in the Digital Age appeared first on Unit 42.

This article has been indexed from Unit 42

Read the original article:

Data Is the New Diamond: Heists in the Digital Age

Tags: EN Unit 42

Post navigation

← IT Security News Hourly Summary 2025-08-27 00h : 7 posts
UNC6395 and the Salesloft Drift Attack: Why Salesforce OAuth Integrations are a Growing Risk →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • IT Security News Hourly Summary 2025-08-27 09h : 5 posts August 27, 2025
  • FinTech 2025: Head-to-Head August 27, 2025
  • These $20 earbuds have no business sounding this good for the price – and I’m an audiophile August 27, 2025
  • China linked Silk Typhoon targeted diplomats by hijacking web traffic August 27, 2025
  • Silicon AI for Your Business Podcast: Combating Fraud with AI Agents August 27, 2025
  • FinTech 2025: The Future of Money and Machines August 27, 2025
  • 7 AI features I’d like to see the iPhone 17 embrace from Google, OpenAI, and others August 27, 2025
  • DOGE puts critical SS data at risk? CISA warns of new exploited flaw, K-Pop stock heist attacker extradited to South Korea August 27, 2025
  • A Simple Phrase Defeats GPT5 Security August 27, 2025
  • What are the differences between OpenAI’s GPT 5 and GPT 4o? August 27, 2025
  • I tried using a $159 Chromebook as my main laptop for a week – and it was oddly satisfying August 27, 2025
  • Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code August 27, 2025
  • BGP’s security problems are notorious. Attempts to fix that are a work in progress August 27, 2025
  • Critical Chrome Use-After-Free Flaw Enables Arbitrary Code Execution August 27, 2025
  • Interesting Technique to Launch a Shellcode, (Wed, Aug 27th) August 27, 2025
  • Hackers Abuse Compromised OAuth Tokens to Access and Steal Salesforce Corporate Data August 27, 2025
  • Yes, you can buy a MacBook Air for just $142 right now – here’s what’s included August 27, 2025
  • China-based Threat Actor Mustang Panda’s Tactics, Techniques, and Procedures Unveiled August 27, 2025
  • Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances August 27, 2025
  • How compliance teams can turn AI risk into opportunity August 27, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}