Topic: phishing lures

  • How Hackers Poison AI and How to Stop Them

    How Hackers Poison AI and How to Stop Them

    Cybercriminals are leveraging AI to create sophisticated spam, malicious code, and phishing campaigns, while also directly targeting AI systems to exploit vulnerabilities. Attackers use AI to refine deceptive communications through A/B testing and exploit AI assistants and security tools, leading...

    Read More »
  • Microsoft 365 Users Hit by Sneaky Device Code Phishing

    Microsoft 365 Users Hit by Sneaky Device Code Phishing

    Attackers are exploiting Microsoft's device code authorization flow to bypass multi-factor authentication, tricking users into granting account access via fraudulent login portals. The campaigns are scaled using readily available red team tools like Squarephish and Graphish, which automate phishi...

    Read More »