4d ago · 4 min read · 📋 Top Headlines at a Glance Law enforcement disrupted Tycoon 2FA phishing-as-a-service platform SailPoint expands AI-powered identity security with adaptive identity framework Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraIns...
Join discussion
5d ago · 17 min read · Audience: IT Pros & End Users Platform: Microsoft 365 Threat Class: Adversary-in-the-Middle (AiTM) Phishing Series: MFA & Conditional Access Part: 1 of 7 Telling your users to enable Multi-Factor Au
Join discussion
6d ago · 4 min read · TL;DR Large language models (Claude, GPT-4, Gemini) have become force multipliers for spear-phishing. Attackers use LLMs to personalize phishing emails with 90%+ accuracy. A single attacker can generate thousands of convincing, targeted phishing emai...
Join discussionMar 7 · 11 min read · Large language models have made social engineering attacks faster, cheaper, and dramatically more convincing. Security teams are not prepared for what's coming. In January 2024, researchers at IBM X-Force ran an experiment. They asked ChatGPT to cra...
Join discussionMar 3 · 4 min read · A phishing campaign posing as a Google Account security check is tricking users into installing a Progressive Web App (PWA) that functions as a full browser-based RAT — stealing MFA codes in real time, harvesting cryptocurrency wallets, and turning t...
Join discussionFeb 23 · 8 min read · Mở đầu Các nhà nghiên cứu an ninh mạng thời gian gần đây đã công bố chi tiết về ZeroDayRAT, một nền tảng mobile spyware thế hệ mới đang được bán công khai trên Telegram, sở hữu khả năng gián điệp thời
Join discussion
Feb 23 · 4 min read · About the Author I am Prayush Hada, a SOC Analyst in CryptoGen Nepal. This post synthesizes my findings during my SOC internship, where I moved from following alerts to investigating the human logic b
Join discussion