Tag: phishing
-
Businesses fear AI is exposing them to more attacks
More than half of companies have already faced AI-powered phishing attacks, a new survey finds. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/it-leaders-concern-ai-cyberattacks-survey/802151/
-
TDL 006 – Beyond the Firewall: How Attackers Weaponize Your DNS
Tags: access, attack, breach, business, cisa, ciso, computer, conference, control, cyber, data, data-breach, dns, exploit, firewall, google, government, group, guide, infrastructure, intelligence, Internet, iraq, jobs, leak, malicious, malware, network, phishing, ransomware, service, software, switch, threat, tool, windowsSummary Beyond the Firewall: How Attackers Weaponize Your DNS For many IT professionals, DNS is the internet’s invisible plumbing, historically managed by a “guy with a Unix beard in the basement,” as Infoblox educator Josh Kuo recalled on the Defenders Log podcast. But this foundational, often overlooked, protocol has become a primary vector for sophisticated…
-
EyeMed Agrees to Pay $5M to Settle Email Breach Litigation
2020 Hack Has Cost EyeMed About $12.6M in Multiple Regulatory Fines, Settlements. Benefits provider EyeMed Vision Care has agreed to pay $5 million and improve its security practices to settle class action litigation involving a 2020 phishing breach. The incident has been the subject of previous multimillion dollar settlements and enforcement actions by multiple state…
-
Most People Can’t Tell AI Phishing Emails from the Real Thing
AI-crafted phishing emails are fooling every generation. Learn why no one’s immune”, and how to build stronger defenses. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/ai-phishing-scams-outsmarting-everyone/
-
The role of Artificial Intelligence in today’s cybersecurity landscape
AI is transforming cybersecurity”, from detecting phishing and insider threats to accelerating response. See how Waziuh, the open-source XDR and SIEM, integrates AI to turn raw security data into actionable insights and smarter threat hunting. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/the-role-of-artificial-intelligence-in-todays-cybersecurity-landscape/
-
Are Phishing Simulations Still Worth It?
Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, and how……
-
Phishing-Kampagne zielt auf Führungskräfte
Sicherheitsforscher warnen vor einer gezielten Welle von Spear-Phishing-Angriffen, die insbesondere Führungskräfte und leitende Angestellte in verschiedenen Branchen ins Visier nehmen. Die Angreifer tarnen ihre Nachrichten als Benachrichtigungen zur Freigabe von Onedrive-Dokumenten und versehen sie mit Betreffzeilen wie ‘Gehaltsänderung” oder ‘FIN_SALARY”. Ein Klick auf den enthaltenen Link führt die Empfänger auf eine täuschend echt gestaltete Anmeldeseite…
-
HP Threat Insights Report – Living off the Land und Phishing entwickeln sich weiter
First seen on security-insider.de Jump to article: www.security-insider.de/hp-threat-insights-report-phishing-lotl-techniken-verfeinern-a-1743be683e58d0fc0f3871cfc78b6ae9/
-
XWorm malware resurfaces with ransomware module, over 35 plugins
New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project last year. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/xworm-malware-resurfaces-with-ransomware-module-over-35-plugins/
-
Cyberbedrohungslage für KMUs spitzt sich zu
Tags: ai, business, cisco, cyberattack, cyersecurity, extortion, germany, infrastructure, leak, phishing, ransomware, risk, vulnerabilityKMUs sind häufig Ziel von Ransomware-Angriffen.Laut der Transferstelle Cybersicherheit im Mittelstand haben sich Cyberangriffe auf deutsche Unternehmen, die auf Leak-Seiten veröffentlicht wurden, zwischen den Jahren 2021 bis 2024 mehr als vervierfacht. Damit ist Deutschland trauriger Spitzenreiter, gefolgt von Italien, Frankreich und Spanien.Auch die Zahlen des Bundeskriminalamts (BKA) bestätigen diese Entwicklung. Der polizeilichen Kriminalstatistik von 2024…
-
From Deception to Defense: Understanding and Combating Phishing
Phishing remains one of the most persistent and dangerous cybersecurity threats, now amplified by AI and deepfake technologies. Despite decades of mitigation efforts, attackers continue to exploit human behavior through deception and social engineering. A multidisciplinary approach”, combining technical innovation, behavioral science, and policy reform”, is essential to counter evolving phishing tactics and build long-term…
-
CISOs rethink the security organization for the AI era
Jill Knesek, CISO, BlackLine BlackLineEchoing Oleksak, Knesek says she feels strongly about utilizing traditional security and having the right controls in place. Getting foundational security right will get you a long way, she says.’Then, as you learn about more sophisticated attacks “¦ we’ll have to pivot our tooling and capabilities to those risks.” For now,…
-
Reading the ENISA Threat Landscape 2025 report
ENISA Threat Landscape 2025: Rising ransomware, AI phishing, and state-backed espionage mark a converging, persistent EU cyber threat landscape. ENISA Threat Landscape 2025 report provides a comprehensive analysis of the evolving threat landscape in Europe. The report analyzes the events that occurred between July 2024 and June 2025, including nearly 4,900 verified incidents. This year’s…
-
CISOs rethink the security organization for the AI era
Jill Knesek, CISO, BlackLine BlackLineEchoing Oleksak, Knesek says she feels strongly about utilizing traditional security and having the right controls in place. Getting foundational security right will get you a long way, she says.’Then, as you learn about more sophisticated attacks “¦ we’ll have to pivot our tooling and capabilities to those risks.” For now,…
-
Phishing is old, but AI just gave it new life
The volume of cyberattacks has reached staggering levels, with new tactics that blur the line between legitimate and malicious activity. A new threat report from Comcast, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/06/phishing-ai-enterprise-resilience-security/
-
Schnäppchen und Phishing voraus: Amazon Prime Day am 7. und 8. Oktober 2025
Tags: phishingFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/schnaeppchen-phishing-amazon-prime-day-7-8-oktober-2025
-
The Emperor’s New Clothes: Why Compulsory CBTs and Phishing Tests Keep Failing
Most phishing training, and indeed most compulsory computer-based training (CBT) modules, are largely ineffective in reducing incidents – and are therefore a waste of time and resources. Finally we have the data we need to challenge this, and find a better path to user awareness that may actually reduce the frequency and impact of cyber…
-
Generation Z führt die Liste der Opfer von Phishing-Angriffen an
Zum Cybersecurity Awareness Month hat Yubico die Ergebnisse seiner jährlichen internationalen Umfrage vorgestellt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cloud-security/generation-z-der-opfer-phishing-angriffe
-
SideWinder Hacker Group Targets Users with Fake Outlook/Zimbra Portals to Steal Login Credentials
Tags: apt, credentials, cyber, defense, government, group, hacker, infrastructure, login, malicious, phishingThe notorious SideWinder APT group has intensified its credential harvesting operations across South Asia, deploying sophisticated phishing campaigns that target government, defense, and critical infrastructure organizations through fake webmail portals. The campaign represents a significant escalation from the group’s August 2024 activities, which initially focused on 14 malicious webpages hosted on Netlify and pages.dev platforms.…
-
New ‘PointClick’ Phishing Kit Evades Security Filters to Deliver Malicious Payloads
A new toolkit named Impact Solutions has emerged on cybercrime forums, offering a comprehensive, user-friendly framework for crafting advanced phishing campaigns. By democratizing malware delivery, Impact Solutions empowers even low-skill threat actors to bypass both end users and conventional security filters, delivering malicious payloads via seemingly innocuous attachments. This article explores the mechanics of Impact…
-
KI-generierte Phishing-Mails werden immer besser so kannst du dich dennoch schützen
First seen on t3n.de Jump to article: t3n.de/news/ki-generierte-phishing-mails-schuetzen-1707881/
-
Von wegen Enkeltrick: Diese Zielgruppe ist überraschend anfällig für Phishing-Mails
First seen on t3n.de Jump to article: t3n.de/news/phishing-anfaellig-genz-betrug-1709721/
-
Silent Smishing: Abuse of Cellular Router APIs in Phishing Campaigns
Attackers exploit vulnerable cellular routers to send large-scale smishing messages that bypass traditional defenses. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/silent-smishing-abuse-of-cellular-router-apis-in-phishing-campaigns/
-
Cryptohack Roundup: White House Pulls CFTC Chair Nom
Also: Texas Brothers Charged in $8M Crypto-Linked Kidnapping Case. This week, Brian Quintenz won’t lead the U.S. CFTC, Canada fined KuCoin $14M, Texas brothers charged in an $8M kidnapping case, South Korean actor given suspended sentence for embezzlement, phishing campaign used robots.txt and an ex-LASD deputy pleaded guilty in a business extortion scam. First seen…
-
Neue Phishing-Variante greift Gmail-Nutzer an
Tags: access, adobe, awareness, cio, ciso, cyberattack, hacker, intelligence, mail, malware, phishing, ransomware, risk, spear-phishing, threat, tool, zero-trustHacker haben gefälschte PDF-Dateien an Gmail-Nutzer verschickt, die täuschend echt wirken. Forscher des Sicherheitsunternehmens Varonis haben eine raffinierte Phishing-Methode entdeckt, die auf Gmail-Nutzer zielt. Dabei kommt eine Malware zum Einsatz, die sich nicht nur als PDF-Anhang tarnt, sondern die Opfer automatisch dazu auffordert, diesen zu öffnen.’Der Dateityp .PDF ist im privaten und geschäftlichen Bereich allgegenwärtig…
-
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan with malware families like WooperStealer and Anondoor.”Over the past decade, Confucius has repeatedly targeted government agencies, military organizations, defense contractors, and critical industries — especially in Pakistan using spear-phishing and malicious documents as initial First seen on…
-
Phishing Is Moving From Email to Mobile. Is Your Security?
With SMS, voice, and QR-code phishing incidents on the rise, it’s time to take a closer look at securing the mobile user. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/phishing-moving-email-mobile-is-your-security

