Testing Our Defenses Against ChatGPT-Generated Phishing & Fraud Emails
Find out the results of our experiment testing xorlab's ability to detect and block ChatGPT-generated phishing and fraud emails.
Find out the results of our experiment testing xorlab's ability to detect and block ChatGPT-generated phishing and fraud emails.
Find out how large text-generating AI models like ChatGPT can be used to launch highly sophisticated and dynamic social engineering and phishing...
Learn how some of the most significant supply chain phishing attacks unfolded and how security leaders can protect their organizations more...
Learn which financial institutions have faced MITM attacks recently and what strategies companies can implement to defend against this growing threat.
Find out what makes whaling attacks so successful and what processes organizations should put in place to mitigate this significant risk.
Discover how the main types of email impersonation work and what organizations can do to reduce their risk exposure as effectively as possible.
Find out how the most damaging and costly Business Email Compromise attacks unfolded and discover the most effective defense strategies.
Email spoofing is a common way for cybercriminals to launch social engineering attacks. Discover the main spoofing methods & how to defend against...
Vendor email compromise attacks are thoroughly researched and highly targeted. Discover how VEC works and the most effective protection strategies.
Hospitals are among the biggest targets of account takeover attacks. Discover what the most common attack methods are & how to avoid defend against...