Arsen Security Blog

Introducing the New Arsen Cyber Awareness Training Platform

Introducing the New Arsen Cyber Awareness Training Platform

For the past few weeks, we’ve been gradually deploying a redesigned security awareness training module, progressively available to all customers. We have designed our new training module specifically for the AI era. It moves beyond static compliance content to deliver...

Why Basic Phishing Training Won't Stop AI Social Engineering

Why Basic Phishing Training Won't Stop AI Social Engineering

Annual phishing training built around spotting typos and suspicious sender addresses doesn't address AI-enabled social engineering. In 2025, 83% of phishing emails were AI-generated with flawless...

AI Vishing: Why Finance Teams Are the New Front Line

AI Vishing: Why Finance Teams Are the New Front Line

AI voice cloning has collapsed the cost of vishing from hundreds of dollars per targeted call to effectively zero at scale. Finance, treasury, and executive assistant teams now face the same...

Deepfake Fraud in Financial Services: What CISOs Need to Do Now

Deepfake Fraud in Financial Services: What CISOs Need to Do Now

Deepfake fraud is now an active loss event for financial institutions. Over $200 million in financial losses were attributed to deepfake fraud in Q1 2025 alone (Resemble AI), and 44% of financial...

VENOM: Inside a C-Suite Credential Theft Campaign That Neutralizes MFA

VENOM: Inside a C-Suite Credential Theft Campaign That Neutralizes MFA

Abnormal Intelligence documented VENOM, a previously unknown PhaaS platform behind a five-month campaign targeting C-suite executives across 20+ industries, systematically bypassing MFA to...

From a CEO Impersonation, a Slack Lure to a Full-On Compromise: The Axios & UNC1069 Case

From a CEO Impersonation, a Slack Lure to a Full-On Compromise: The Axios & UNC1069 Case

The recent Axios npm supply chain attack, attributed to UNC1069 (suspected North Korean actors), was not a technical exploit. It was a meticulously crafted social engineering campaign. From a...

Google Safe Browsing: How to Recover from a Domain Flagging

Google Safe Browsing: How to Recover from a Domain Flagging

Phishing simulation domains can get flagged by Google Safe Browsing even when used for legitimate security testing. Here's how to recover flagged domains fast and keep your awareness campaigns...

Google Safe Browsing: How to Stay Invisible to Google's Bots

Google Safe Browsing: How to Stay Invisible to Google's Bots

Google Safe Browsing protects billions of devices — but it can disrupt authorized phishing simulations. Discover multi-layered anti-crawling strategies including IP filtering, CAPTCHA, time-based...

Google Safe Browsing: How Does It Work?

Google Safe Browsing: How Does It Work?

Google Safe Browsing protects billions of users from malicious websites and phishing threats. But for organizations running internal phishing simulations, it creates real technical hurdles....

How to Defend Against Advanced Smishing Attacks (and Why Basic Training Isn't Enough Anymore)

How to Defend Against Advanced Smishing Attacks (and Why Basic Training Isn't Enough Anymore)

Smishing has moved well beyond a fraudulent text. From MitM OTP hijacking to cross-channel escalation, here's how sophisticated SMS-based attacks work, and what it takes to stop them.

ClickFix Attacks: How Hackers Make Your Employees Run Malware Themselves

ClickFix Attacks: How Hackers Make Your Employees Run Malware Themselves

ClickFix is one of the fastest-growing social engineering attack techniques. It needs no exploit, no malicious attachment, just a fake error message and a willing user. Here is what happened, why...

AI-Enhanced Vishing in Financial Services: How Voice Cloning Is Outpacing Your Defenses

AI-Enhanced Vishing in Financial Services: How Voice Cloning Is Outpacing Your Defenses

AI voice cloning has turned vishing into a scalable, high-precision weapon against financial institutions. A Canadian insurer lost $12M after an AI-cloned executive voice authorized fraudulent...

Supply Chain Attacks in Financial Services: Why Your Vendors Are Becoming Your Biggest Vulnerability

Supply Chain Attacks in Financial Services: Why Your Vendors Are Becoming Your Biggest Vulnerability

Your perimeter controls mean nothing if an attacker compromises a trusted vendor first. The SitusAMC breach in November 2025 exposed data across 100+ financial institutions without touching a...

Protect Your Business Against Phishing

Discover how our phishing simulations can effectively reduce your human attack surface.

Request a Demo