Massive Increase to Unwanted Cell Calls

Massive Increase to Unwanted Cell Calls

 Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase! I rarely give out the number so I assume one of the following:Ended up on a ...
social engineering, social red teams, cybersecurity,

In a Social Engineering Showdown: AI Takes Red Teams to the Mat 

That AI has gotten much more proficient in social engineering is a revelation that's not surprising, but still sets alarm bells ringing ...
Security Boulevard
Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
social engineering, Gen Z

Gen Z’s Rising Susceptibility to Social Engineering Attacks

Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation ...
Security Boulevard
ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans

ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans

When security teams first spotted ClickFix in early 2024, few predicted it would last long in the threat landscape. Yet here we are in 2025, watching this simple attack continue its devastating ...
How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...
How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...
Immutable Cybersecurity Law #12

Immutable Cybersecurity Law #12

 “Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality, many of the most successful breaches stem from ...
From Phishing to Vishing – Modern Social Engineering Attacks

From Phishing to Vishing – Modern Social Engineering Attacks

Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...