Browser security is under unprecedented attack as AI-driven phishing attacks rise. A recent Menlo Security analysis of 750,000 phishing attacks against more than 800 organizations over the last year shows a 140% growth in browser-based phishing. Most disturbingly, zero-hour phishing attacks—those that take advantage of newly discovered vulnerabilities—have increased by 130%. Cyberattacks are taking advantage of generative AI (gen-AI) to craft sophisticated phishing attacks that are more difficult to spot, and this makes it simpler to deceive users into divulging sensitive information or installing malware. The trend will gather pace in 2025 as the attackers mature their AI-facilitated tactics, according to warnings from experts. A number of reasons are contributing to the increase in these attacks. Our increasing use of browsers for work, the proliferation of zero-day exploits, and the sophistication of attackers all fuel the issue. Gen-AI is a critical component, allowing attackers to build sophisticated phishing sites, impersonate AI services, and perform targeted social engineering. Phishing-as-a-service (PhaaS) platforms are also being used by criminals, enabling even less skilled hackers to deliver sophisticated phishing campaigns at scale. On mobile platforms, restricted URL visibility and auto-login capabilities further boost the efficacy of such threats, rendering it even more difficult for users to identify phishing sites. To counter these threats, professionals suggest increased caution while surfing. Users should check the authenticity of the domain while entering credentials or downloading content, particularly from AI websites. Companies need to employ sophisticated security, including AI-based threat detection and phishing techniques training for employees. Multi-factor authentication (MFA) and endpoint security products can reduce risks. With AI-powered attacks growing more complex, active cybersecurity steps and user awareness will be essential in protecting sensitive data.
Microsoft has released its September 2025 Patch Tuesday security updates, addressing 81 vulnerabilities, including two publicly disclosed zero-day flaws (CVE-2025-55234 and CVE-202...
Rockwell Automation has issued a critical advisory for a vulnerability tracked as CVE-2025-7350, affecting its Stratix industrial Ethernet switches. The flaw, rated 9.6 CVSS 3.1 sc...
In June 2025, Chess.com suffered a data breach when attackers exploited a third-party file transfer tool used by the platform. The intrusion took place between June 5 and June 18, ...