Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges

The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...
social engineering, Gen Z

Gen Z’s Rising Susceptibility to Social Engineering Attacks

Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation ...
Security Boulevard
ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans

ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans

When security teams first spotted ClickFix in early 2024, few predicted it would last long in the threat landscape. Yet here we are in 2025, watching this simple attack continue its devastating ...
How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...
How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

How Attackers Abuse Trusted Cloud Apps—and Why URL Analysis Matters

It’s no secret that cybercriminals love to exploit our trust in well-known brands. From big-name retailers to popular online services, attackers will latch onto anything that seems safe. In this post, we ...
Immutable Cybersecurity Law #12

Immutable Cybersecurity Law #12

 “Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality, many of the most successful breaches stem from ...
From Phishing to Vishing – Modern Social Engineering Attacks

From Phishing to Vishing – Modern Social Engineering Attacks

Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...
From Phishing to Vishing – Modern Social Engineering Attacks

From Phishing to Vishing – Modern Social Engineering Attacks

Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...
Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension

Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension

Imagine that your AI transcriber tool shapeshifts into your password manager, then your crypto wallet and finally into your banking app — all without your knowledge. This is exactly what polymorphic extensions can do ...