AI, Risks, human

AI may not Destroy the World, but There are Other Risks

For some, AI is the stuff of nightmares. Whether it’s Hal refusing to open the pod bay doors in 2001: A Space Odyssey or the wild thought experiment of Roko’s Basilisk—or even ...
Security Boulevard
A person failing a live phishing test and being frustrated

An employee clicked on a phishing link: 5 steps to take to protect your business

The post An employee clicked on a phishing link: 5 steps to take to protect your business appeared first on Click Armor ...

SuperVPN, Enzo Biochem experience data breaches

With each passing year, it seems data breaches become more costly to victims, and 2022 was no exception. Verizon’s annual Data Breach Investigations Report found, for instance, that the average cost of ...
DEF CON 30  - Nick Powers, Steven Flores  – ClickOnce AbUse for Trusted Code Execution

Less SmartScreen More Caffeine: (Ab)Using ClickOnce for Trusted Code Execution

The contents of this blogpost was written by Nick Powers (@zyn3rgy) and Steven Flores (@0xthirteen), and is a written version of the content presented at Defcon30.With the barrier to entry for initial ...
Travel Site Protects Business Critical Loyalty Points with Arkose Labs

Travel Alert: How Bot Attacks Are Exploiting Loyalty Programs

The convenience and allure of online travel websites cannot be overstated. From booking flights to securing accommodations, these platforms offer seamless experiences for travelers worldwide. However, the dark side of this digital ...
Compare the Top 8 Open Source Phishing Threat Intel Feeds

Compare the Top 8 Open Source Phishing Threat Intel Feeds

| | Blog, Phishing
Phishing threats evolve and adapt quickly. Even before one phishing domain is taken down, many more emerge. It can become a game of whac-a-mole for security and IT teams with a lot ...
Bad Bots and Beyond: 2023 State of the Threat Report

2023 State of the Threat for Telco & Streaming Media

Arkose Labs conducted a comprehensive analysis of current threats across various industries in 2022 to identify the frequency and types of attacks in today’s landscape. Here, we share valuable insights into emerging ...
CNN reporter calls his parents using an AI deepfake voice. Watch what happens next

Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims

Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML) voice cloning ...
Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security 

Mobile Threats Increase as Hackers Exploit the Lack of BYOD Security 

The rising trend of employees using personal devices for work has cybercriminals directing focus towards mobile devices for launching attacks. The lack of security protection and accessibility of sensitive information on these ...
QR codes ransomware, attacks, RaaS, SlashNext ransomware phishing attack

Phishing Attacks Shift to IT, Online Services-Related Campaigns 

More IT and online services-related email subjects are being used as a phishing lure, as phishing emails continue to be one of the most common methods to perpetuate malicious attacks on organizations ...
Security Boulevard