Social Engineering

Xanthorox AI – The Next Generation of Malicious AI Threats Emerges
Daniel Kelley | | ai threats, bec, Browser protection, business email compromise, credential theft, Cybersecurity, Email Protection, generative AI, hacking tool, Phishing, Phishing Attacks, social engineering, Threat Discovery, Xanthorox AI
The Next Evolution in Black-Hat AI A new player has entered the cybercrime AI landscape – Xanthorox AI, a malicious tool that brands itself as the “Killer of WormGPT and all EvilGPT ...

Longtime ‘Fast Flux’ Evasion Technique Now a National Security Threat
CISA, the FBI, and NSA issued an advisory about the national security threat posed by "fast flux," a technique used by threat actors to evade detection of their C2 infrastructures that has ...
Security Boulevard

App Stores OK’ed VPNs Run by China PLA
Richi Jennings | | 360 Security Technology, App Store, App Stores, Apple, CCP, china, china espionage, China-nexus cyber espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, free vpn app, google, Google Play Store, Peoples Republic of China, Privacy, Qihoo 360, SB Blogwatch, Signal Secure VPN, Snap VPN, Tech Transparency Project, Thunder VPN, TikTok, TikTok Ban, Turbo VPN, VPN, VPN Proxy Master
Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads ...
Security Boulevard

Gen Z’s Rising Susceptibility to Social Engineering Attacks
Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation ...
Security Boulevard

JFK and the Houthis: Haste Makes Waste of SecurityÂ
Rather than simply exposing buried truths of the assassination, the final tranche of JFK files also exposed the personal information, including social security numbers, of a parade of people associated with the ...
Security Boulevard

ClickFix: Social Engineering That Bypasses EDRs, SWGs and Humans
When security teams first spotted ClickFix in early 2024, few predicted it would last long in the threat landscape. Yet here we are in 2025, watching this simple attack continue its devastating ...

Hackers Use Atlantis AIO Tool to Automate Account Takeover Attacks
Atlantis AIO, a tool available to hackers on the dark web, gives threat actors an automated tool to rapidly test millions of stolen credentials against email, ecommerce, and other online accounts on ...
Security Boulevard

Addressing Security Challenges in Cloud-Based Social Networks
SDN offers a flexible, intelligent solution to address these challenges, empowering platforms to optimize performance, allocate resources effectively, enhance security and deliver seamless user experiences. ...
Security Boulevard

Intro to Deceptionology: Why Falling for Scams is Human Nature
Deception is a core component of many cyberattacks, including phishing, scams, social engineering and disinformation campaigns ...
Security Boulevard

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...