Phishing

Seeing the Big Picture in Phishing Defense: IRONSCALES & CrowdStrike
At the start of this year, IRONSCALES launched an integration with CrowdStrike Falcon® Next-Gen SIEM, delivering enhanced threat visibility, detection, and correlation to help organizations combat phishing and account takeover (ATO) threats ...

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
How Hotels Are Preparing Against AI-Powered Bot Attacks
Today’s travel industry relies on a vast digital ecosystem. For consumers, the ease of online reservations lends convenience and a seamless experience in booking their business travel or vacation. But as ever, ...

Gen Z’s Rising Susceptibility to Social Engineering Attacks
Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation ...

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters
It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters
It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...
Why So Many Employee Phishing Training Initiatives Fall Short
During the work-from-home boom of 2020, GitLab, a company that largely employs tech-savvy individuals, decided to test its security by sending fake phishing messages to its WFH workers. About one out of ...

From Phishing to Vishing – Modern Social Engineering Attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...

From Phishing to Vishing – Modern Social Engineering Attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...