According to ZDNet: Scam-as-a-Service operation made more than $6.5 million in 2020

“Classiscam” operation is made up of around 40 groups operating in the US and across several European countries.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

76% of Android Apps Can Be Hacked With This 6-Second Trick – Why CISOs Should Care

⚠️ 76% of Android Apps Can Be Hacked – Here’s How

🔍 A zero-permission app can hijack your taps, steal data, and even wipe your device. No overlays. No alerts. No chance to notice.

🔥 This is TapTrap – an animation-driven attack that works on Android 15, bypassing all current defenses.

✔ Exploits a 6-second attack window caused by a system flaw.
✔ Grants camera, location, and notification access without consent.
✔ Escalates to device admin for full control.
✔ Extends to web clickjacking, compromising browsers and MFA flows.

📊 Our findings:
✅ 99,705 apps analyzed
✅ 76.3% vulnerable
✅ 100% of users in our study failed to detect it

Enterprise takeaway? This is a CISO issue. A single compromised phone can leak sensitive data, expose authentication codes, and break compliance.

👉 Want to see how this works and what defenses actually stop it?
Book your free TapTrap security briefing today.

#CyberSecurity #Android #MobileSecurity #CISO #CTO #RiskManagement

read more

Android 15 Is Still Vulnerable – How TapTrap Bypasses Every Defense

🚨 Android 15 Still Exposed – The Attack Nobody Saw Coming

⚠️ Imagine a zero-permission app silently hijacking your taps. No overlays. No SYSTEM_ALERT_WINDOW. No warnings.

📱 This is TapTrap – a groundbreaking attack that bypasses every Android tapjacking defense using UI animations instead of overlays.

💥 Here’s what makes it terrifying:
✅ Works on Android 15 – the latest version
✅ Grants camera, location, and notification access without you noticing
✅ Can escalate to full device wipe or browser-based clickjacking
✅ Exploits a flaw that doubles the attack window to 6 seconds

📊 We analyzed 99,705 Play Store apps:
✔ 76.3% are vulnerable
✔ User study: 100% of participants failed to spot it

🔍 Security indicators? Easily masked. Privacy Dashboard? Doesn’t show the malicious app.

If you manage mobile security for your org, this is a wake-up call. A single compromised device can leak corporate data, break MFA, and open doors for phishing.

Ready to see how this attack works and how to defend before it hits your business?
Book a free TapTrap security briefing now.

#CyberSecurity #Android #MobileSecurity #CISOs #CTOs #RiskManagement #AppSec

read more

New Phishing Attack Uses DWP Impersonation to Steal Credit Card Data – How to Protect Yourself and Your Organization

⚠️ New Phishing Scam Targets Users by Posing as DWP

A fresh wave of phishing attacks is tricking victims with highly convincing messages pretending to be from the UK’s Department for Work and Pensions.

🚨 The scam aims to steal credit card details by exploiting trust in official institutions and using professional branding to appear legitimate.

🔍 Recognizing urgent requests for financial data and suspicious links is vital but challenging due to the scam’s sophistication.

🛡️ Traditional filters aren’t enough; ongoing, realistic social engineering training is critical to keep your defenses strong.

AUMINT Trident simulates real phishing attacks tailored to your business, preparing employees to spot and stop fraud in its tracks.

Stay ahead of evolving threats before they hit your organization.

Schedule your AUMINT demo today

#Phishing #CyberSecurity #SocialEngineering #FraudPrevention #AUMINT #SecurityAwareness #CISO

read more

SAVE YOUR COMPANY FROM SOCIAL ENGINEERING HACKER ATTCKS

REGISTER AND GET YOUR FREE EXPOSURE REPORT – AND FIND YOUR COMPANY’S BLIND SPOTS

Register NOW