This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one […] ...
From Phishing to Vishing – Modern Social Engineering Attacks

From Phishing to Vishing – Modern Social Engineering Attacks

Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...
From Phishing to Vishing – Modern Social Engineering Attacks

From Phishing to Vishing – Modern Social Engineering Attacks

Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...
FCC Commissioner Brendan Carr speaking at the 2018 Conservative Political Action Conference (CPAC) in National Harbor, Maryland.

FINALLY! FCC Gets Tough on Robocall Fraud

KYC isn’t a Thing, claims telco: Commissioner Brendan Carr (pictured) wants $4.5 million fine on Telnyx, for enabling “illegal robocall scheme.” ...
Security Boulevard
Australia Bans Social Media for Kids: Controversial Move Explained

Australia Bans Social Media for Kids, Holiday Vishing Scams

In this episode, we discuss Australia’s new legislation banning social media for users under 16 and its potential impact. Our hosts also explore the issue of vishing (voicemail phishing), why it’s escalating, ...
vishing, romance scams generative AI pig butchering

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

The best way to defend against vishing attacks is by educating ourselves on how threat actors operate, and to become familiar with the tools, techniques and procedures used to carry out these ...
Security Boulevard
The Power of Vishing

The Power of Vishing

Just a couple of years ago, vishing, or voice phishing, was an unknown term. However, vishing is getting more attention […] ...

Watch Out for Vishing!

This year, the celebration of Cybersecurity Awareness Month (CAM) focuses on establishing a secure behavior by following four simple steps – using strong passwords and a password manager, deploying MFA wherever possible, ...
Vishing breaking down social engineering techniques

Vishing: Breaking Down Social Engineering Techniques

If you’ve read our past joint newsletter, you know that Curt and I (Shelby) approach vishing in a way that […] ...
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...