News

The latest Jamf security report reflects an increasingly complex and organized threat environment for Apple users.
Malware campaign abuses Cloudflare Tunnel and phishing lures to deliver in-memory RATs across multiple regions.
Phishing has evolved—and trust is the new attack vector. ChainLink Phishing uses real platforms like Google Drive & Dropbox ...
Fraud patterns vary across Africa, but smishing, phishing and vishing dominate in most countries, consistently ranking above global averages.Kenya leads with high exposure to mobile-based scams: ...
Scattered Spider targets U.S. insurance firms using social engineering and MFA bypass tactics. GTIG urges vigilance.
A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence ...
AI is automating the way social engineering is done. Traditional phishing markers like spelling errors or bad grammar are a ...
Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced the ...
FIN6’s latest campaign combines professional rapport-building with cloud-hosted malware delivery to target sensitive HR ...
Bitget's report resonates with the one released by Chainalysis in February 2025, which stated that generative artificial intelligence fueled last year's record losses from crypto scam. In fact, ...
Crypto drainers-as-a-service (DaaS) offers complete social engineering toolkits, including fake DEX websites, wallet prompts and Telegram support bots for anyone to run phishing campaigns ...