Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Report: Sophisticated Fraud Attacks Are on the Rise

Sophisticated online fraud techniques are growing more accessible to unskilled attackers, driven by AI tools and fraud-as-a-service platforms, according to Sumsub’s latest Identity Fraud Report. “hile the volume of attacks remains staggering, the nature of fraud is shifting,” the researchers write.

Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race

While most cybersecurity companies pour resources into AI models, massive compute, hoovering up all the data, and enhanced analytics to detect and prevent threats, Frenetik, a Maryland cyber startup, is betting on something simpler: making sure attackers don't know what defenders know. The company emerged today with a fundamentally different approach using novel cyber deception and a newly issued U.S. patent to back it.

DefacinGit - Defacement page templates hosted on GitHub

As explored in CYJAX’s recent blog, “PhishinGit – GitHub.io pages abused for malware distribution”, a core feature of GitHub is that it allows users to create and host free static webpages for repositories on github.io. Whilst this service is primarily used to display legitimate projects and host functional webpages, it is known to be used to host malicious files, infrastructure, and content.

3 takeaways from the 2025 EDUCAUSE annual conference

This year's EDUCAUSE brought together leaders from IT, security, enrollment, and student services. The theme, “Restoring Trust,” reflects the challenges that higher education institutions and professionals are facing. Fraudsters are using new tools and techniques to target faculty and students. Whether they’re trying to gain access to sensitive information or steal student aid, the potential danger is real.

Why Account Takeover Is a CX Problem, Not Just a Security One

Account takeover is usually and unsurprisingly approached as a security incident, yet much of the customer impact begins earlier in the journey, long before security teams detect or analyse the event. When users face friction, lockouts, or unexpected changes to their accounts, trust starts to erode. This makes the account takeover impact on customer experience a major determinant of brand trust and loyalty.

Scammers Are Exploiting the Holiday Shopping Season

Users should be particularly wary of holiday-themed scams over the next few weeks, according to researchers at Malwarebytes. “Mobile-first shopping has become second nature, and during the holidays, it’s faster and more frantic than ever,” Malwarebytes says. “Fifty-five percent of people get a scam text message weekly, while 27% are targeted daily. Downloading new apps, checking delivery updates, or tapping limited-time offers all feel routine.

Malvertising 101: When the Top Ad on Your Search Is a Trap

Online searching is something we do on a daily basis, often more than once, and we usually rely on the first result that appears. While it's the most practical solution, it's not the safest. In recent years, we've seen a growing threat called malvertising, which is a much more sophisticated trap than most of what we're accustomed to seeing. The numbers indicate that this is an increasing concern, and we'll explain how to protect yourself from it.

The Dubai Wi-Fi Trap: Why Free Internet Might Cost You Everything

You land in Dubai, grab your luggage, step outside into the warm desert breeze - and the first thing you see? Free Wi-Fi everywhere. Cafés, malls, beaches, taxis, even parking machines. It feels like a digital paradise. And while you're waiting for your car rent Dubai pickup, you naturally connect to whatever hotspot seems legit. After all, it's Dubai - everything here is premium, safe, polished. Right? Not exactly.

Retail Peak Season & Account Takeover Prevention: The 2025 Survival Guide

The retail sector approaches the 2025 peak holiday season facing a perfect storm. We are no longer contending with opportunistic human fraudsters or rudimentary scripts. We face a tidal wave of autonomous, generative AI-powered agents capable of mimicking human behavior. According to Ran Arad, a subject matter expert at Memcyco, we must view phishing, digital impersonation, and account takeover (ATO) as an interrelated lifecycle. Usually, a phishing attack provides the link to an impersonating site.