vishing

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one […] ...

From Phishing to Vishing – Modern Social Engineering Attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...

From Phishing to Vishing – Modern Social Engineering Attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...

FINALLY! FCC Gets Tough on Robocall Fraud
KYC isn’t a Thing, claims telco: Commissioner Brendan Carr (pictured) wants $4.5 million fine on Telnyx, for enabling “illegal robocall scheme.” ...

Australia Bans Social Media for Kids, Holiday Vishing Scams
In this episode, we discuss Australia’s new legislation banning social media for users under 16 and its potential impact. Our hosts also explore the issue of vishing (voicemail phishing), why it’s escalating, ...

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
The best way to defend against vishing attacks is by educating ourselves on how threat actors operate, and to become familiar with the tools, techniques and procedures used to carry out these ...

The Power of Vishing
Just a couple of years ago, vishing, or voice phishing, was an unknown term. However, vishing is getting more attention […] ...
Watch Out for Vishing!
This year, the celebration of Cybersecurity Awareness Month (CAM) focuses on establishing a secure behavior by following four simple steps – using strong passwords and a password manager, deploying MFA wherever possible, ...

Vishing: Breaking Down Social Engineering Techniques
If you’ve read our past joint newsletter, you know that Curt and I (Shelby) approach vishing in a way that […] ...

Today’s cybersecurity health checks must identify AI based threats. Does yours?
Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...