Cybersecurity Insights

Industry trends, phishing statistics, case studies, threat forecasts.

Cybersecurity Insights Phishing Awareness

#PacketHunters – HTML smuggling in Calendar invites (aka the .ics you didn’t inspect)

What looks like a harmless calendar invite can be a hidden delivery system.
Attackers are now embedding base64-encoded HTML payloads inside .ics files — turning “urgent meeting” requests into stealth phishing and credential traps. In this week’s #PacketHunters, we dissect how HTML smuggling works inside calendar invites, how different mail clients handle it, and how to simulate it safely before the attackers do.

Wake up, Neo!
Cybersecurity Insights Phishing Awareness

Your wrist is a vault.. until the vault leaks!

Your smartwatch isn’t just counting steps, it’s quietly building a map of your life. Every heartbeat, sleep cycle, and GPS ping is logged across different apps and clouds, each one a potential breach point. When attackers combine those leaks with phishing emails that mimic trusted brands, the result is more than stolen data: it’s identity exposure, targeted scams, and a perfect playbook for social engineering.

Customer Stories / Case Studies Cybersecurity Insights

Challenges of Building an AI system for Phishing Simulation

In today’s rapidly evolving threat landscape, it is important to integrate innovative security solutions to mitigate new attack trends. One area of innovation involves leveraging multi-modal large language models (LLMs) to simulate more realistic attack scenarios. However, building and deploying such sophisticated systems, especially for activities like phishing simulation, presents a unique set of challenges

Scroll to Top