Arsen Security Blog

New: simulate ClickFix attacks on your workforce to identify who needs training before it's too late.

New: simulate ClickFix attacks on your workforce to identify who needs training before it's too late.

ClickFix attacks trick employees into running malware themselves, without any exploit needed. Learn how this fast-growing threat works, who it targets, and how Arsen's new ClickFix simulations help you stay ahead of it.

Google Safe Browsing: How Does It Work?

Google Safe Browsing: How Does It Work?

Google Safe Browsing protects billions of users from malicious websites and phishing threats. But for organizations running internal phishing simulations, it creates real technical hurdles....

How to Defend Against Advanced Smishing Attacks (and Why Basic Training Isn't Enough Anymore)

How to Defend Against Advanced Smishing Attacks (and Why Basic Training Isn't Enough Anymore)

Smishing has moved well beyond a fraudulent text. From MitM OTP hijacking to cross-channel escalation, here's how sophisticated SMS-based attacks work, and what it takes to stop them.

ClickFix Attacks: How Hackers Make Your Employees Run Malware Themselves

ClickFix Attacks: How Hackers Make Your Employees Run Malware Themselves

ClickFix is one of the fastest-growing social engineering attack techniques. It needs no exploit, no malicious attachment, just a fake error message and a willing user. Here is what happened, why...

AI-Enhanced Vishing in Financial Services: How Voice Cloning Is Outpacing Your Defenses

AI-Enhanced Vishing in Financial Services: How Voice Cloning Is Outpacing Your Defenses

AI voice cloning has turned vishing into a scalable, high-precision weapon against financial institutions. A Canadian insurer lost $12M after an AI-cloned executive voice authorized fraudulent...

Supply Chain Attacks in Financial Services: Why Your Vendors Are Becoming Your Biggest Vulnerability

Supply Chain Attacks in Financial Services: Why Your Vendors Are Becoming Your Biggest Vulnerability

Your perimeter controls mean nothing if an attacker compromises a trusted vendor first. The SitusAMC breach in November 2025 exposed data across 100+ financial institutions without touching a...

Deepfake Video Impersonation: The Threat Financial Institutions Can No Longer Ignore

Deepfake Video Impersonation: The Threat Financial Institutions Can No Longer Ignore

Deepfake video impersonation has crossed from theoretical risk to documented loss. The 2024 Arup attack cost $25 million after a finance employee was deceived by a live AI-generated video call....

 The Financial Services CISOs White Paper: Navigating Cyber & AI Regulations in 2026

The Financial Services CISOs White Paper: Navigating Cyber & AI Regulations in 2026

AI regulation is accelerating fast. From DORA to the EU AI Act, financial services CISOs face a tightening compliance landscape in 2026. Arsen breaks down what may change, what is at stake, and...

AI-Powered Social Engineering in Financial Services: What Every CISO Needs to Know in 2026

AI-Powered Social Engineering in Financial Services: What Every CISO Needs to Know in 2026

AI-powered social engineering is reshaping the threat landscape for banks, insurers, and fintechs. This guide gives financial services CISOs the frameworks, checklists, and strategic intelligence...

Microsoft Entra Users: Be Careful, You Might Be the Target of a New Vishing Campaign

Microsoft Entra Users: Be Careful, You Might Be the Target of a New Vishing Campaign

ShinyHunters are exploiting a legitimate Microsoft OAuth feature to compromise Entra accounts. No fake login page, no stolen password. One convincing vishing phone call is all it takes to hand...

Figure Data Breach: Social Engineering Actors Are Preying on Fintechs, but It’s Not a Fatality

Figure Data Breach: Social Engineering Actors Are Preying on Fintechs, but It’s Not a Fatality

Blockchain lending firm Figure confirmed a significant data breach resulting from a social engineering attack on an employee, leading to the leak of customer data and highlighting the persistent...

The Era of "Dark LLMs": How AI is Supercharging Social Engineering

The Era of "Dark LLMs": How AI is Supercharging Social Engineering

The AI revolution of the 2020s has positioned Large Language Models (LLMs) as the new foundation for digital transformation. With unparalleled data processing power and text comprehension, LLMs...

How Sophisticated Vishing Attacks are Currently Bypassing SSO for Wide-Scale SaaS Data Theft

How Sophisticated Vishing Attacks are Currently Bypassing SSO for Wide-Scale SaaS Data Theft

The ShinyHunters group is currently orchestrating vishing attacks and exploiting SSO to bypass multi-factor authentication. These sophisticated campaigns have led to breaches of cloud platforms...

Protect Your Business Against Phishing

Discover how our phishing simulations can effectively reduce your human attack surface.

Request a Demo