vishing

New Spin on Vishing: Attackers Are Now Targeting Healthcare Appointments
When we think about vishing (voice phishing), the usual suspects come to mind: fake refund scams impersonating Norton, PayPal, or Geek Squad ...

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one […] ...

From Phishing to Vishing – Modern Social Engineering Attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...

From Phishing to Vishing – Modern Social Engineering Attacks
Phishing attacks have moved beyond simply sending emails with malicious links to incorporate more modern social engineering techniques, including the alarming trend of mixing in smishing (SMS phishing) and vishing (voice phishing) ...

FINALLY! FCC Gets Tough on Robocall Fraud
KYC isn’t a Thing, claims telco: Commissioner Brendan Carr (pictured) wants $4.5 million fine on Telnyx, for enabling “illegal robocall scheme.” ...

Australia Bans Social Media for Kids, Holiday Vishing Scams
In this episode, we discuss Australia’s new legislation banning social media for users under 16 and its potential impact. Our hosts also explore the issue of vishing (voicemail phishing), why it’s escalating, ...

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
The best way to defend against vishing attacks is by educating ourselves on how threat actors operate, and to become familiar with the tools, techniques and procedures used to carry out these ...

The Power of Vishing
Just a couple of years ago, vishing, or voice phishing, was an unknown term. However, vishing is getting more attention […] ...
Watch Out for Vishing!
This year, the celebration of Cybersecurity Awareness Month (CAM) focuses on establishing a secure behavior by following four simple steps – using strong passwords and a password manager, deploying MFA wherever possible, ...

Vishing: Breaking Down Social Engineering Techniques
If you’ve read our past joint newsletter, you know that Curt and I (Shelby) approach vishing in a way that […] ...