Learn the latest data breach trends for 2025. Bluefin's Founder Ruston Miles explains AI-driven phishing, ransomware, supply chain attacks, and data devaluation protection.| Bluefin
TAG-150 is a sophisticated threat actor that has been deploying CastleLoader, CastleBot, and the newly identified CastleRAT since March 2025, leveraging a multi-tiered infrastructure and advanced phishing tactics.| blog.polyswarm.io
The vulnerability, a directory traversal bug, was addressed in WinRAR version 7.13.| CySecurity News - Latest Information Security and Hacking Incidents
Breakdown of the most common types of phishing attacks, real breach examples, and how to detect them before damage is done.| GCS Technologies
Devil-Traff is a new bulk SMS platform enabling phishing campaigns with features like sender ID spoofing, API automation, and support for spam, facilitating large-scale cyberattacks at low cost.| SlashNext | Complete Generative AI Security for Email, Mobile, and Browser
PhishWP creates fake payment pages that look like trusted services. It's used as a phishing trap to steal sensitive information such as credit card numbers, personal data, and browser metadata.| SlashNext | Complete Generative AI Security for Email, Mobile, and Browser
There are many different types of phishing attacks, including executive phishing, whaling phishing, smishing, and vishing.| CenturyLink