Flipping the BEC funnel: Phishing in the age of GenAI
For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written) email and fire it out to thousands of recipients in the hope that a few might take the bait. Over time, however, as s.....»»
Guardz launches AI-powered Multilayered Phishing Protection to secure SMEs
Guardz has unveiled a new AI-powered Multilayered Phishing Protection solution to help small and medium-sized enterprises (SMEs) and managed service providers (MSPs) prevent phishing attacks before their security is compromised. The solution uses AI.....»»
Cybercriminals use legitimate websites to obfuscate malicious payloads
According to Egress, the evolving attack methodologies currently used by cybercriminals are designed to get through traditional perimeter security. “The evolution of phishing emails continues to pose a major threat to organizations, emphasizing the.....»»
Phishing campaigns thrive as evasive tactics outsmart conventional detection
A 25% increase in the use of phishing kits has been recorded in 2022, according to Group-IB. The key phishing trends observed are the increasing use of access control and advanced detection evasion techniques. The rise in evasive tactics, such as ant.....»»
Organizations spend 100 hours battling post-delivery email threats
Nearly every victim of a spear-phishing attack in the last 12 months saw impacts on their organization, including malware infections, stolen data, and reputational damage, according to Barracuda Networks. Barracuda Networks research finds 24% of orga.....»»
Funnel-web spider venom varies depending on circumstances, shows study
Scientists studying the most venomous spider in the world have found the venom of some varies depending on circumstances—which could provide insights into how they could be of use for human health......»»
Week in review: Zyxel firewalls vulnerability, phishing campaign targets ChatGPT users
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Wireless Broadband Alliance CEO on key drivers for Wi-Fi adoption in enterprise networks This Help Net Security interview with Tiago Rodrigues, CEO.....»»
Is cybersecurity an unsolvable problem?
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing. Enlarge (credit: Farrar, Straus and Giroux) In November 1988, a graduate student at Cornell University named Robert Morris, Jr. i.....»»
Why build proprietary GenAI? Q&A with BCG Henderson Institute global director Francois Candelon
The progress of generative artificial intelligence (GenAI) over the past few years has taken many people in the industry by surprise. Since the release of GPT-3, the research community and industry experts have been exploring its potential and pushin.....»»
Phishers use encrypted file attachments to steal Microsoft 365 account credentials
Phishers are using encrypted restricted-permission messages (.rpmsg) attached in phishing emails to steal Microsoft 365 account credentials. “[The campaigns] are low volume, targeted, and use trusted cloud services to send emails and host conte.....»»
Threat actors exploit new channels for advanced phishing attacks
Perception Point’s team has identified a 356% increase in the number of advanced phishing attacks attempted by threat actors in 2022. Overall, the total number of attacks increased by 87%, highlighting the growing threat that cyber attacks now.....»»
Why build proprietary GenAI? Q&A with BCG Henderson Institute global director Francois Candelon
The progress of generative artificial intelligence (GenAI) over the past few years has taken many people in the industry by surprise. Since the release of GPT-3, the research community and industry experts have been exploring its potential and pushin.....»»
Phishing campaign targets ChatGPT users
A clever phishing campaign aimed at stealing users’ business email account credentials by impersonating OpenAI, the company behind the ChatGPT chatbot, has been spotted by Inky researchers. The attack ChatGPT has quickly gained popularity and i.....»»
How funnel-web spiders practice safe sex
The complex mating rituals of the Sydney funnel-web spider have now been described in detail for the first time, with sexual routines including leg and body vibrations and female lifting, filling a missing link in the study of spiders......»»
Exploring the tactics of phishing and scam websites in 2023
Phishing scams pose an escalating danger as cybercriminals employ increasingly sophisticated techniques, rendering their detection and prevention more challenging. In this Help Net Security video, Abhilash Garimella, Head of Research at Bolster, talk.....»»
Greatness phishing-as-a-service threatens Microsoft 365 users
Manufacturing businesses, healthcare organizations, and tech companies in English-speaking countries are the most targeted by phishers leveraging a relatively new phishing-as-a-service (PaaS) tool called Greatness, created to phish Microsoft 365 user.....»»
Intel, BCG collaborate to deliver enterprise-grade, secure generative AI
Intel and Boston Consulting Group (BCG) have announced a strategic collaboration to enable generative artificial intelligence (GenAI) using end-to-end Intel AI hardware and software. The GenAI solution delivers fully custom and proprietary solutions.....»»
Should companies allow employees to use work Macs as administrators?
In 2023, security is a top priority for every organization, including businesses using Macs. While very secure, Macs are still vulnerable to threats, including phishing attacks and malware. Security is no longer a technology concern. It’s now a.....»»
Think your data has no value? Scammers disagree
In the first quarter of 2023 there was a significant increase in cyberattacks exploiting trust in established tech brands Microsoft and Adobe, according to Avast. The Avast report also found a 40% rise in the share of phishing and smishing attacks ov.....»»
You can now use passkeys to sign into your Google Account
Google has spent the past several years working to replace passwords because of frequent reuse, vulnerability to data breaches, and phishing. Passkeys are the industry solution, and the ability to log in to your Google Account with them is starting.....»»
Phishing-resistant MFA shapes the future of authentication forms
Over the last two years, respondents reported a continued reliance on the least secure forms of authentication, including traditional usernames and passwords and one-time passwords (OTPs), according to Yubico. Not all MFA is equal The results are sur.....»»