social engineering

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
Daniel Kelley | | ai threats, bec, Browser protection, business email compromise, credential theft, Cybersecurity, Email Protection, generative AI, hacking tool, Phishing, Phishing Attacks, social engineering, Threat Discovery, Xanthorox AI
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
Daniel Kelley | | ai threats, bec, Browser protection, business email compromise, credential theft, Cybersecurity, Email Protection, generative AI, hacking tool, Phishing, Phishing Attacks, social engineering, Threat Discovery, Xanthorox AI
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...

Gen Z’s Rising Susceptibility to Social Engineering Attacks
Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation ...
Security Boulevard

ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans
When security teams first spotted ClickFix in early 2024, few predicted it would last long in the threat landscape. Yet here we are in 2025, watching this simple attack continue its devastating ...

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters
Stephen Kowski | | bec, Browser Phishing Protection, Browser protection, business email compromise, credential theft, Email Protection, Link Phishing, Phishing, Phishing Attacks, Product, social engineering
It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters
Stephen Kowski | | bec, Browser Phishing Protection, Browser protection, business email compromise, credential theft, Email Protection, Link Phishing, Phishing, Phishing Attacks, Product, social engineering
It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...

Immutable Cybersecurity Law #12
“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality, many of the most successful breaches stem from ...

From Phishing to Vishing – Modern Social Engineering Attacks
Daniel Kelley | | bec, business email compromise, credential theft, Email Protection, Phishing, Phishing Attacks, smishing, social engineering, vishing, vishing attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...

From Phishing to Vishing – Modern Social Engineering Attacks
Daniel Kelley | | bec, business email compromise, credential theft, Email Protection, Phishing, Phishing Attacks, smishing, social engineering, vishing, vishing attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...

Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension
Imagine that your AI transcriber tool shapeshifts into your password manager, then your crypto wallet and finally into your banking app — all without your knowledge. This is exactly what polymorphic extensions can do ...