Social Engineering

In a Social Engineering Showdown: AI Takes Red Teams to the Mat
That AI has gotten much more proficient in social engineering is a revelation that's not surprising, but still sets alarm bells ringing ...
Security Boulevard

Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25
David Lindner, Director, Application Security | | Alert Fatigue, cisa, Cloud Security, Cybersecurity, Red Teaming, Threat Intelligence, training
Insight No. 1 — How to survive without CISA As CISA scales back, it’s time for enterprises to wake up to a harsh reality: You can’t rely on the government to secure ...

The Renaissance of NTLM Relay Attacks: Everything You Need to Know
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive ...

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
Daniel Kelley | | ai threats, bec, Browser protection, business email compromise, credential theft, Cybersecurity, Email Protection, generative AI, hacking tool, Phishing, Phishing Attacks, social engineering, Threat Discovery, Xanthorox AI
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
Daniel Kelley | | ai threats, bec, Browser protection, business email compromise, credential theft, Cybersecurity, Email Protection, generative AI, hacking tool, Phishing, Phishing Attacks, social engineering, Threat Discovery, Xanthorox AI
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...

Longtime ‘Fast Flux’ Evasion Technique Now a National Security Threat
CISA, the FBI, and NSA issued an advisory about the national security threat posed by "fast flux," a technique used by threat actors to evade detection of their C2 infrastructures that has ...
Security Boulevard

App Stores OK’ed VPNs Run by China PLA
Richi Jennings | | 360 Security Technology, App Store, App Stores, Apple, CCP, china, china espionage, China-nexus cyber espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, free vpn app, google, Google Play Store, Peoples Republic of China, Privacy, Qihoo 360, SB Blogwatch, Signal Secure VPN, Snap VPN, Tech Transparency Project, Thunder VPN, TikTok, TikTok Ban, Turbo VPN, VPN, VPN Proxy Master
Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads ...
Security Boulevard

Gen Z’s Rising Susceptibility to Social Engineering Attacks
Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation ...
Security Boulevard

JFK and the Houthis: Haste Makes Waste of Security
Rather than simply exposing buried truths of the assassination, the final tranche of JFK files also exposed the personal information, including social security numbers, of a parade of people associated with the ...
Security Boulevard

ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans
When security teams first spotted ClickFix in early 2024, few predicted it would last long in the threat landscape. Yet here we are in 2025, watching this simple attack continue its devastating ...