social engineering

Massive Increase to Unwanted Cell Calls
Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase! I rarely give out the number so I assume one of the following:Ended up on a ...

In a Social Engineering Showdown: AI Takes Red Teams to the Mat
That AI has gotten much more proficient in social engineering is a revelation that's not surprising, but still sets alarm bells ringing ...
Security Boulevard

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
Daniel Kelley | | ai threats, bec, Browser protection, business email compromise, credential theft, Cybersecurity, Email Protection, generative AI, hacking tool, Phishing, Phishing Attacks, social engineering, Threat Discovery, Xanthorox AI
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
Daniel Kelley | | ai threats, bec, Browser protection, business email compromise, credential theft, Cybersecurity, Email Protection, generative AI, hacking tool, Phishing, Phishing Attacks, social engineering, Threat Discovery, Xanthorox AI
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...

Gen Z’s Rising Susceptibility to Social Engineering Attacks
Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation ...
Security Boulevard

ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans
When security teams first spotted ClickFix in early 2024, few predicted it would last long in the threat landscape. Yet here we are in 2025, watching this simple attack continue its devastating ...

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters
Stephen Kowski | | bec, Browser Phishing Protection, Browser protection, business email compromise, credential theft, Email Protection, Link Phishing, Phishing, Phishing Attacks, Product, social engineering
It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters
Stephen Kowski | | bec, Browser Phishing Protection, Browser protection, business email compromise, credential theft, Email Protection, Link Phishing, Phishing, Phishing Attacks, Product, social engineering
It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...

Immutable Cybersecurity Law #12
“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality, many of the most successful breaches stem from ...

From Phishing to Vishing – Modern Social Engineering Attacks
Daniel Kelley | | bec, business email compromise, credential theft, Email Protection, Phishing, Phishing Attacks, smishing, social engineering, vishing, vishing attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...