article thumbnail

News alert: Arsen’s rolls out AI-powered phishing tests to improve social engineering resilience

The Last Watchdog

24, 2025, CyberNewswire — Arsen , a leading cybersecurity company specializing in social engineering defense, today announced the full release of Conversational Phishing, a groundbreaking feature embedded in its phishing simulation platform. Media contact: Thomas Le Coz, CEO, Arsen, marketing@arsen.co Paris, France, Mar.

article thumbnail

News alert: Arsen launches AI-powered vishing simulation to help combat voice phishing at scale

The Last Watchdog

3, 2025, CyberNewswire– Arsen , the cybersecurity startup known for defending organizations against social engineering threats, has announced the release of its new Vishing Simulation module, a cutting-edge tool designed to train employees against one of the fastest-growing attack vectors: voice phishing (vishing). Paris, Jun.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Happy 15th Anniversary, KrebsOnSecurity!

Krebs on Security

Much of my summer was spent reporting a story about how advertising and marketing firms have created a global free-for-all where anyone can track the daily movements and associations of hundreds of millions of mobile devices , thanks to the ubiquity of mobile location data that is broadly and cheaply available.

article thumbnail

Synthetic Sabotage: How AI Tools Are Fueling Tailored Phishing Campaigns at Scale

SecureWorld News

The phishing game has evolved into synthetic sabotage a hybrid form of social engineering powered by AI that can personalize, localize, and scale attacks with unnerving precision. At the heart of many of these kits are large language models (LLMs) trained or fine-tuned specifically for social engineering tasks.

article thumbnail

15 SpyLoan Android apps found on Google Play had over 8 million installs

Security Affairs

SpyLoan apps exploit social engineering to gain sensitive user data and excessive permissions, leading to extortion, harassment, and financial loss. “ SpyLoan apps exploit official app stores like Google Play, deceptive branding, and social media ads to appear credible. ” reads the report published McAfee.

article thumbnail

Russia's COLDRIVER Targets Western Entities with 'LOSTKEYS' Malware

SecureWorld News

The method, known as "ClickFix," leverages social engineering to bypass traditional email-based defenses. The LOSTKEYS malware shows how attackers are getting smarter at tricking people and sneaking past basic security tools, especially by using fake websites and social engineering to get users to run harmful scripts," said J.

article thumbnail

EDR-as-a-Service makes the headlines in the cybercrime landscape

Security Affairs

Guidebooks are also available to instruct on how to exploit the information obtained, in order to more effectively target victims through social engineering and doxxing campaigns.