Evolution of Spear Phishing Tactics

Five Ways Spear Phishing Tactics are Evolving in 2025

What type of phishing became very effective around 2010 and still worries security teams today? Spear phishing. Spear phishing remains  highly effective and is getting more dangerous by the day. What is ...
Evolution of Spear Phishing Tactics

Five Ways Spear Phishing Tactics are Evolving in 2025

What type of phishing became very effective around 2010 and still worries security teams today? Spear phishing. Spear phishing remains  highly effective and is getting more dangerous by the day. What is ...
A green bubble icon

E2EE is MIA in iPhone/Android Chat — GSMA Gonna Fix it

No More Barf-Green Bubbles? GSM Association is “excited” to bring Apple and Google closer together, but encryption is still lacking ...
Security Boulevard
Zimperium, Android, Rafel RAT ransomware

Phishing Threats Rise as Malicious Actors Target Messaging Platforms

As messaging apps like Telegram gain popularity, cybercriminals are increasingly finding they are an attractive vector for phishing attacks ...
Security Boulevard
Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly

Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly

In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support ...
app, sideloading, MDM, Apple, IoS, SEC SIM swap X account

Addressing the Mobile Malware Threat With Zero-Trust

AI-enabled zero-trust solutions can help address the rising threat of mobile malware ...
Security Boulevard
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
James Keiser Blog Title Image - Lessons from the Field, Part 1

Lessons from the Field, Part I: Backup and Disaster Recovery 

By James Keiser, Director of Secured Managed Services Southeast, CISO Global, Inc. In the ongoing battle to protect corporate data, you can’t afford to miss a step. I’ve seen, first-hand, what can ...