Social Engineering

Social Engineering

social engineering, social red teams, cybersecurity,

In a Social Engineering Showdown: AI Takes Red Teams to the Mat 

That AI has gotten much more proficient in social engineering is a revelation that's not surprising, but still sets alarm bells ringing ...
Security Boulevard
Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

Insight No. 1 — How to survive without CISA As CISA scales back, it’s time for enterprises to wake up to a harsh reality: You can’t rely on the government to secure ...
DEF CON 20 - Marlinspike Hulton and Ray - Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2

The Renaissance of NTLM Relay Attacks: Everything You Need to Know

NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive ...
Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
domain Major DNS Threats: Preventing DNS Hijacking

Longtime ‘Fast Flux’ Evasion Technique Now a National Security Threat

CISA, the FBI, and NSA issued an advisory about the national security threat posed by "fast flux," a technique used by threat actors to evade detection of their C2 infrastructures that has ...
Security Boulevard
social engineering, Gen Z

Gen Z’s Rising Susceptibility to Social Engineering Attacks

Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation ...
Security Boulevard
JFK; files, Microsoft Recall security privacy features cybersecurity

JFK and the Houthis: Haste Makes Waste of Security 

Rather than simply exposing buried truths of the assassination, the final tranche of JFK files also exposed the personal information, including social security numbers, of a parade of people associated with the ...
Security Boulevard
ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans

ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans

When security teams first spotted ClickFix in early 2024, few predicted it would last long in the threat landscape. Yet here we are in 2025, watching this simple attack continue its devastating ...