When Real Emails Become Phishing Weapons: Robinhood Exposes the New Risk of Trusted Infrastructure Abuse

Phishing has moved far beyond the classic spam emails that were easy to detect. Today, attackers increasingly abuse legitimate systems and trusted infrastructure to create highly convincing attacks that bypass both technical defenses and human suspicion. The recent Robinhood case is a strong example of this new reality. Users of the trading platform received what […]
Fortinet Award Signals Shift Toward Platform-Driven Cloud Workload Security

The recognition of Fortinet as Google Cloud Partner of the Year 2026 for Workload Security may initially appear as a standard vendor milestone. However, it reflects a much broader market shift: cloud security is rapidly evolving into a core strategic layer of modern IT architectures. At the center of this recognition is the collaboration between […]
AI Is Turning Phishing into a Continuous Trust Manipulation System

The way phishing is still discussed in many organizations is rooted in an outdated mental model. Suspicious emails, poorly written messages, strange domains — these are the classic indicators that have shaped how teams think about phishing risk. But this model is starting to break down. What is emerging in the current threat landscape is […]
AI Is Resetting the Threat Curve for Phishing — From Emails to Full-Scale Trust Manipulation

Artificial intelligence is rapidly transforming the nature of phishing attacks, pushing them far beyond traditional email-based scams and into a new phase of autonomous, multi-channel threat execution. In a recent conversation with Dark Reading, Eyal Benishti, CEO of IRONSCALES, described how AI is fundamentally reshaping the phishing landscape — and why many existing defenses are […]
Meta Doubles Down on Agentic AI – And Bets Big on AWS Graviton CPUs

Meta is making a clear statement about where the next phase of AI infrastructure is heading. In an expanded partnership with Amazon Web Services, the company has committed to using tens of millions of Graviton5 CPU cores – positioning itself as one of the largest customers of Amazon’s custom ARM-based processors. At first glance, this […]
Germany’s IP Retention Push Shows Europe’s Cybercrime Dilemma

Germany is reopening one of Europe’s most sensitive digital policy debates: how far should governments be allowed to go in storing connection data before crime has even been committed by a specific suspect? The German cabinet has approved a proposal that would require internet access providers to store IP address assignments for three months. The […]
Gaming Fraud Economy: How PlayStation, App Stores and In-Game Currencies Became a Modern Attack Surface

What was once considered a purely entertainment-driven ecosystem has quietly evolved into one of the most attractive environments for modern fraud operations. Gaming platforms such as the PlayStation Store, mobile app stores, and in-game marketplaces are no longer just distribution channels for content. They have become complex digital economies where identity, payment infrastructure, and virtual […]
Encryption Remained Intact: How Law Enforcement Bypassed EncroChat & Co. – And Why Modern Attacks No Longer Target Cryptography

For years, encrypted communication platforms were perceived as impenetrable strongholds. Systems like EncroChat and Sky ECC were not just tools, they were ecosystems built around one core promise: absolute confidentiality. Within these environments, organized crime, international networks, and high-risk actors operated under the assumption that their communications were beyond reach. The logic was simple. If […]
Signal Phishing Campaigns: When Trust Becomes the Primary Attack Surface

The recent phishing attacks targeting users of the Signal messenger, including individuals at the highest levels of political leadership, are not just another incident in an increasingly crowded threat landscape. They represent a structural shift in how modern cyberattacks are designed, executed, and scaled. At first glance, the attack appears familiar: attackers impersonate support, create […]
Comment and Control: When GitHub Comments Become Commands and AI Agents Turn Into an Attack Surface

Artificial intelligence is rapidly becoming embedded in development workflows, security reviews, and automation processes. AI-powered coding agents promise efficiency, speed, and a new level of interaction between humans and machines. But this shift is also creating a new and largely underestimated attack surface. With the method known as “Comment and Control,” security researchers have demonstrated […]