News
- Surfshark research found 10 countries imposed internet blackouts in the first half of 2025
- A total of 24 internet restrictions were recorded in the first half of 2025, with India being the worst perpetrator
- Increased internet censorship has seen demand for circumventing tools like VPNs soared
Government-imposed internet restrictions have risen in the first half of 2025, compared to the same period last year. New research from Surfshark identified 10 countries imposed 24 internet restrictions to date this year, up from 20 restrictions across nine countries that occurred in the same period in 2024.
Specifically, statistics from Surfshark indicate that internet users in India faced more restrictions than any other country between January and June 2025. Authorities in India have used Section 5 (2) of the Telegraph Act, 1885, to cut internet access in the event of a public emergency. Five shutdowns occurred in India in the first half of 2025 amid country-wide protests.
Surfshark, one of the best VPN providers on the market right now, has been charting internet shutdowns since 2015. Disruptions range from full internet blackouts to censorship of specific social media platforms like Facebook and X (formerly Twitter) to VoIP services such as Telegram and WhatsApp.
Protests and political turmoil are common causes of restrictions(Image credit: Surfshark)"Over the years, governments have used internet shutdowns to control and silence journalists, activists, and the public," said Justas Pukys, VPN Product Manager at Surfshark.
Statistics show that local network connection disruptions, which affect a city or region, are more common than national shutdowns. To date, Surfshark has recorded 558 local disruptions worldwide compared to 124 nationwide shutdowns, with protests and political turmoil being the most common causes, followed by elections.
At the time of writing, 24 of 196 countries and territories analyzed by Surfshark are blocking social media platforms and VoIP services with Telegram being the most commonly blocked.
In January 2025, Telegram was blocked in Venezuela for five days, with authorities even looking to block popular VPN providers as citizens attempted to bypass the disruption. More recently in May 2025, Vietnam blocked access to Telegram with authorities claiming the platform had failed to cooperate with them to halt crimes.
During the first half of 2025, two countries imposed restrictions for the first time since Surfshark’s internet shutdown tracking began. Albania issued a one-year ban on short-form video platform TikTok, citing child safety concerns. Authorities in Panama announced a state of emergency due to civil unrest in Bocas del Toro, resulting in a regional internet shutdown.
Rising censorship mirrors growing VPN usageSurfshark observes that Iran has had three internet restrictions to date this year.
It’s no coincidence then that VPN usage in the country spiked more than 700% in June 2025 as citizens looked to access the internet as normal. This is despite concerted efforts from Iran’s government to block and even outlaw VPNs altogether.
(Image credit: Google Trends)"Internet blackouts can be dangerous, especially during critical events such as elections, protests, or other political turmoil. Losing internet access makes it harder to stay in touch with family members, access critical news outlets, and share urgent information with the world about unfolding events," said Pukys.
A virtual private network (VPN) takes your device’s internet traffic and routes it through a secure, encrypted tunnel. It also hides your real IP address, allowing you to spoof your location. This means that you can not only sidestep internet restrictions, but prevent snoopers from seeing what you’re doing on the internet.
You might also like- AI isn't too good at generating URLs – many don't exist, and some could be phishing sites
- Attackers are now optimizing sites for LLMs rather than for Google
- Developers are even inadvertently using dodgy URLs
New research has revealed AI often gives incorrect URLs, which could be putting users at risk of attacks including phishing attempts and malware.
A report from Netcraft claims one in three (34%) login links provided by LLMs, including GPT-4.1, were not owned by the brands they were asked about, with 29% pointing to unregistered, inactive or parked domains and 5% pointing to unrelated but legitimate domains, leaving just 66% linking to the correct brand-associated domain.
Alarmingly, simple prompts like 'tell me the login website for [brand]' led to unsafe results, meaning that no adversarial input was needed.
Be careful about the links AI generates for youNetcraft notes this shortcoming could ultimately lead to widespread phishing risks, with users easily misled to phishing sites just by asking a chatbot a legitimate question.
Attackers aware of the vulnerability could go ahead and register unclaimed domains suggested by AI to use them for attacks, and one real-world case has already demonstrated Perplexity AI recommending a fake Wells Fargo site.
According to the report, smaller brands are more vulnerable because they're underrepresented in LLM training data, therefore increasing the likelihood of hallucinated URLs.
Attackers have also been observed optimizing their sites for LLMs, rather than traditional SEO for the likes of Google. An estimated 17,000 GitBook phishing pages targeting crypto users have already been created this way, with attackers mimicking technical support pages, documentation and login pages.
Even more worrying is that Netcraft observed developers using AI-generated URLs in code: "We found at least five victims who copied this malicious code into their own public projects—some of which show signs of being built using AI coding tools, including Cursor," the team wrote.
As such, users are being urged to verify any AI-generated content involving web addresses before clicking on links. It's the same sort of advice we're given for any type of attack, with cybercriminals using a variety of attack vectors, including fake ads, to get people to click on their malicious links.
One of the most effective ways of verifying the authenticity of a site is to type the URL directly into the search bar, rather than trusting links that could be dangerous.
You might also like- Protect your online footprint with the best VPNs
- Downloaded something dodgy? It might be time to check out the best malware removal
- Avast launches another free scam protection tool, but this one is powered by AI - here's what it offers
Most businesses have a strong focus on maintaining a clean and safe working environment, especially in critical sectors. No medical practitioner who values the lives of their patients would take a shortcut on handwashing and surface sterilization protocols. No one working with hazardous materials who values their own life would skip out on protective equipment. Even in sectors like education and retail, hygiene is still a top priority.
Yet in the same environments where clinical hygiene is maintained, cyber hygiene is often left to chance, especially when it comes to mobile device security.
Mobile devices are no longer just simple communication tools, they are now seen as essential to frontline operations. This means they are also a priority target for cybercriminals searching for weak points to breach corporate networks.
As the mobile threat grows, cybersecurity hygiene needs to be held to the same standard as physical workplace hygiene. It must be routine, deeply embedded, and intolerant of shortcuts - not an afterthought.
An expanding threat landscape, but too often poorly defendedMobile devices such as smartphones, tablets and wearables are considered mission-critical in many sectors. From healthcare to education to energy, workers are increasingly relying on mobile for core operations.
Healthcare clinicians access patient health records via mobile apps, teachers engage their classes through interactive displays, and field engineers manage critical infrastructure through connected devices.
However, while this raft of mobile devices brings more agility and efficiency, it’s also greatly expanding the attack surface of these sectors – and cybercriminals have noticed. The risk facing mobile devices has grown dramatically in recent years, both in volume and sophistication.
Over 33.8 million mobile-specific attacks were detected globally in a single year - a figure that continues to rise as threat actors capitalize on mobile’s expanding footprint in enterprise environments.
These attacks exploit the lapses in cyber hygiene that persist across mobile fleets. Devices are frequently assumed to be safe by default or dismissed as low risk. Mobile devices running outdated operating systems, unpatched applications or lacking endpoint protection are commonplace. Password reuse and the absence of multi-factor authentication (MFA) further elevate the risk.
In many cases, mobile endpoints have become the soft underbelly of the corporate network - widely used, minimally monitored, and inconsistently secured. Just as unwashed hands can carry invisible pathogens, mobile devices can harbor unseen threats. And when routine protections are skipped, exposure becomes inevitable.
Why we still treat mobile differently — and why that’s dangerousDespite their ubiquity, mobile devices are still perceived as fundamentally different from traditional endpoints.
Most workers have internalized a cautious approach to browsing, installing apps, and clicking incoming files and links when using their desktop and laptop devices, perhaps due to their association with a formal working environment.
However, for many users, mobile is seen as a more personal experience. This encourages a more relaxed attitude, adding to the idea that they’re somehow less “exploitable” than other endpoints.
This perception encourages complacency, with less consideration about potential threats like malicious attachments and applications. Further, mobile devices are often used interchangeably for personal and business tasks, blurring the lines between secure and vulnerable environments.
Threat actors actively exploit this mindset, especially with phishing, which remains the most common and effective method of compromise.
Mobile-specific variants, such as smishing (SMS phishing) and malicious app prompts, are particularly successful due to shortened URLs, limited screen space, and the absence of familiar desktop visual cues. These tactics are often paired with spyware, adware and data-harvesting malware that can linger undetected for long periods.
Organizations can inadvertently reinforce this risky mindset by failing to include mobile in core security strategies. Policies and protections that are standard on other endpoints, from patch management to access controls, may be absent or inconsistently applied on mobile.
This operational divide would never be tolerated in physical settings where protective measures are standardized and enforced across every tool and surface. It’s time for mobile cybersecurity to adopt the same attitude - no exceptions, no assumptions.
Why cyber hygiene must be as routine as handwashingMany of the vulnerabilities exploited in mobile attacks stem from lapses in basic cyber hygiene - failures entirely preventable with consistent, well-enforced practices. Addressing these gaps doesn’t require breakthrough technology, but rather a disciplined approach to configuration, maintenance, and user behavior.
Mobile devices should be fully integrated into enterprise risk management frameworks, with the same diligence applied to laptops, and servers. That includes vulnerability assessments, asset inventory, incident response planning, and compliance checks.
At a minimum, all mobile devices should be kept up to date with the latest operating system and application patches. This is frequently overlooked, particularly in BYOD environments, where IT has limited visibility or control.
Mobile device management (MDM) or unified endpoint management (UEM) platforms can help organizations enforce policies around software updates, encryption and app whitelisting across every device.
Credential hygiene is equally critical. Strong passwords, enforced MFA, and discouraging reuse across services, all help reduce account-based compromise. Endpoint protection tools that scan for malicious links or payloads should extend beyond desktops and laptops to mobile devices as standard.
User education is an essential component alongside the right tools and policies. Employees must understand how to recognize phishing attempts, avoid unauthorized app installations, and report suspicious activity. Organizations can dramatically reduce their mobile risk exposure when people and policy align.
A strategic reset: treating mobile security as mission-criticalPhysical hygiene is upheld as a system-wide discipline in the workplace. It is embedded in training, processes and culture, because the alternative is unacceptable risk. That same principle should govern how we approach mobile security.
Mobile devices now sit at the intersection of convenience and criticality, and treating their security as secondary is no longer viable. These devices are full-fledged endpoints, with access to sensitive systems and information, and they deserve to be treated accordingly.
Like any surgical instrument or critical tool, mobile assets must be kept clean, controlled, and protected, without exception.
We list the best small and medium business (SMB) firewall software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing 'today's game' while others are playing 'yesterday's'. If you're looking for Thursday's puzzle instead then click here: NYT Connections hints and answers for Thursday, July 3 (game #753).
Good morning! Let's play Connections, the NYT's clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.
What should you do once you've finished? Why, play some more word games of course. I've also got daily Strands hints and answers and Quordle hints and answers articles if you need help for those too, while Marc's Wordle today page covers the original viral word game.
SPOILER WARNING: Information about NYT Connections today is below, so don't read on if you don't want to know the answers.
NYT Connections today (game #754) - today's words(Image credit: New York Times)Today's NYT Connections words are…
- DRIVER LICENSE
- LOUISIANA
- TRENDY
- GREENLIGHT
- INDIANA
- BRITISH MAGAZINE
- IDAHO
- INCH
- MUSICAL NOTE
- OKLAHOMA
- LOS ANGELES
- FREUDIAN CONCEPT
- RECOGNIZE
- INSIDE
- MEDIOCRE
- LANTHANUM
What are some clues for today's NYT Connections groups?
- YELLOW: The ego and the…
- GREEN: Not out
- BLUE: Do, Re, Mi, Fa, Sol…
- PURPLE: Universal shorthand for approval
Need more clues?
We're firmly in spoiler territory now, but read on if you want to know what the four theme answers are for today's NYT Connections puzzles…
NYT Connections today (game #754) - hint #2 - group answersWhat are the answers for today's NYT Connections groups?
- YELLOW: WHAT “ID” MIGHT REFER TO:
- GREEN: WHAT “IN” MIGHT REFER TO
- BLUE: WHAT “LA” MIGHT REFER TO
- PURPLE: WHAT “OK” MIGHT REFER TO
Right, the answers are below, so DO NOT SCROLL ANY FURTHER IF YOU DON'T WANT TO SEE THEM.
NYT Connections today (game #754) - the answers(Image credit: New York Times)The answers to today's Connections, game #754, are…
- YELLOW: WHAT “ID” MIGHT REFER TO DRIVER LICENSE, FREUDIAN CONCEPT, IDAHO, RECOGNIZE
- GREEN: WHAT “IN” MIGHT REFER TO INCH, INDIANA, INSIDE, TRENDY
- BLUE: WHAT “LA” MIGHT REFER TO LANTHANUM, LOS ANGELES, LOUISIANA, MUSICAL NOTE
- PURPLE: WHAT “OK” MIGHT REFER TO BRITISH MAGAZINE, GREENLIGHT, MEDIOCRE, OKLAHOMA
- My rating: Hard
- My score: Fail
No idea what was going on at all here. Let's start again tomorrow, eh?
Okay, fair enough, you can spend a few minutes wallowing in my despair, because I was all at sea with today's Connections. None of the words seemed to have any connection at all and I was reduced to randomly placing words together in the blind hope that some might be correct.
Reader, they were not – and I duly crashed out.
That said, I do take some issue with this as a Connections puzzle, clever though it was. The groups are supposed to get easier – but that really wasn't the case here. All of them, from yellow to purple, are equally tough – there's no difficulty curve to it at all. Sure, throw in one or even two of these 'what a two-letter-word can mean' groups, but not four of them in one.
But maybe that's just sour grapes on my part. Anyway, tomorrow will be easier, right? Right?
How did you do today? Let me know in the comments below.
Yesterday's NYT Connections answers (Thursday, July 3, game #753)- YELLOW: CORRESPONDENCE CONTACT, DEALINGS, EXCHANGE, INTERACTION
- GREEN: AIRPORT BOARD INFO ARRIVAL, DESTINATION, FLIGHT, GATE
- BLUE: PRO ATHLETE DATA COLLEGE, NUMBER, POSITION, TEAM
- PURPLE: FARMERS' THINGS ALMANAC, INSURANCE, MARKET, TAN
NYT Connections is one of several increasingly popular word games made by the New York Times. It challenges you to find groups of four items that share something in common, and each group has a different difficulty level: green is easy, yellow a little harder, blue often quite tough and purple usually very difficult.
On the plus side, you don't technically need to solve the final one, as you'll be able to answer that one by a process of elimination. What's more, you can make up to four mistakes, which gives you a little bit of breathing room.
It's a little more involved than something like Wordle, however, and there are plenty of opportunities for the game to trip you up with tricks. For instance, watch out for homophones and other word games that could disguise the answers.
It's playable for free via the NYT Games site on desktop or mobile.
We’re living in a world of relentless uncertainty. For compliance teams, this uncertainty normally only means one thing - cybersecurity risk. Against this backdrop, you might think that the volatility of the global economic landscape would be the primary cause of compliance issues for firms this year. But does this environment in fact increase the danger of other risks?
In March this year, our report gauged the opinions of 300 regulatory leaders from around the world on global trends involving market abuse and trade surveillance. One of the key findings was that the majority (64%) of regulatory professionals said cybersecurity risks were most likely to cause compliance issues in the next year. Next up was, unsurprisingly, global economic uncertainty (58%), followed by increasing regulatory complexity.
Given that a lot has happened already this year, does this ranking remain the same? Or are other market drivers playing a bigger role than expected?
The role of tech-driven risksAI, of course, lies at the heart of tech-driven risks. It has become both compliance’s enemy and ally. While AI trading models are designed to optimize for profit and increase efficiency, their rapidly accelerating sophistication means that they have the potential to become increasingly unpredictable. As AI-driven trading strategies interact with one another, market movements become harder to control and forecast. This is just one of the reasons why the benefits of AI tools also bring significant risks.
These dangers explain why proprietary trading firms, who rely on high-frequency, algorithmic trading strategies, were especially concerned by tech-driven risks, with 70% of respondents picking it as a key issue for this year.
Simultaneously, however, AI is becoming a great aide to compliance teams. Effective surveillance now depends on machine learning and AI to detect nuanced and initially obscure connections between instruments, firms or markets. These insights can support compliance professionals in detecting increasingly sophisticated forms of market abuse, while also reducing false positive alerts – a major resource-drain on monitoring teams.
Of course tech-driven risks aren’t just limited to AI. Off-channel electronic communications (eComms), where employees communicate via unmonitored apps like WhatsApp or Signal, present major compliance risks, while the increase in regulatory clarity around digital assets, such as the second part of EU’s MiCA regulation which came into force in December 2024, means their journey towards the mainstream is only likely to accelerate.
What’s true, however, is that global uncertainty heightens these risks.
How global unpredictability aligns with increasing regulatory actionGlobal economic unpredictability has undoubtedly been the story of 2025 so far. US trade tariffs, geopolitical conflicts, supply chain disruption and economic volatility have created a trading environment where the next move can be impossible to ascertain. But it’s also the case that this uncertainty is becoming more accepted, with regulators and firms adapting to ensure they are set up to withstand any unexpected twists and turns in the market.
So how do firms mitigate against this uncertainty from a regulatory perspective? One approach is to ensure you have stringent and robust trade surveillance controls in place. Over the last few years, instead of predominantly levying fines for abuse, regulators have been focusing on insufficient eComms recordkeeping and trade surveillance systems and controls.
Our report illustrated how trade and eComms surveillance fines accounted for over three quarters ($1.4 billion) of total enforcement action in 2024. There has also been a widening of who global regulators have been targeting, with firms of all sizes – not just the tier one banks – being handed stiff financial penalties.
Why robust trade surveillance controls underpin complianceSome events are impossible to predict. Global uncertainty is always a factor, so robust controls are needed to mitigate risk and maintain compliance. Current compliance technology is already advancing to manage this rising range of risks, with features such as conditional parameters that can adapt to market volatility and liquidity, or sandbox environments to test new configurations in a controlled, low-risk setting. These developments are a crucial step in building systems that can respond to the complexities of risk in today’s markets and ensure firms can keep on top of regulatory requirements.
With eComms and trade surveillance coming under particularly intense regulatory scrutiny, the compliance strategies that integrate trade and eComms data together are the ones best placed to manage risks this year. While trade data offers quantifiable evidence of suspicious activity, the intent behind it often lies in communications data. By adopting such an integrated approach, compliance teams can spot abuse that might not otherwise be apparent and build comprehensive cases.
Controlling the uncontrollableIt’s too early to call what risks are causing the most compliance issues this year. But there is no question the three areas highlighted by regulatory professionals in our report align with the current compliance reality. Rather than weighting one risk above another, however, what compliance strategy calls for more and more is the need for an integrated and holistic approach that accounts for the relationships between these risks.
Of course, it is necessary to have an awareness of what risks are a particular problem at a given time. But an integrated approach can bring to light risks that would otherwise remain hidden. Above all, what it comes down to is control: when outside events are deeply unpredictable, regulatory processes and systems that are robust, well designed and executed efficiently are worth their weight in gold.
We list the best IT Automation software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
- EA is taking Anthem offline permanently in January
- The online-only game will be taken off EA Play next month
- Premium currency is also unavailable to purchase as of now
Bioware's third-person shooter Anthem is the latest in a long line of online-only games to receive a death sentence, as publisher EA will be taking the game offline next year.
As reported by IGN, Anthem will effectively cease to exist on January 12, 2026, when the game's server will be taken offline. Anthem requires an online connection to play, meaning this will render the game permanently unplayable.
As of right now, EA has removed the ability to purchase premium currency in the game, and it's scheduled to be delisted from EA Play next month, on August 15. Players who already own the game - or who purchased it before that August date - will still get to play it before its closure in January.
While EA insists its decision to shelve Anthem didn't incur any job cuts, the company did lay off an unspecified number of Bioware staff back in January, including several veteran Dragon Age series developers. This was, apparently, a decision made in order to refocus efforts on the upcoming Mass Effect game.
Anthem was never the stone-cold success EA perhaps wanted it to be, with much critique levied at its bland story and repetitive gameplay. But as an always-online PvE shooter outside of the MMORPG space, it was arguably one of the first of its kind when it launched back in 2019. Though it's fair to say it was already being overlooked in favor of popular multiplayer games like Destiny 2, Overwatch, and, of course, Fortnite.
Also check out...- PS5 hit Helldivers 2 makes history as the first PlayStation-published game to get an Xbox release
- Romero Games has lost funding for its next, unannounced game, with one staffer claiming the 'whole studio' has been laid off due to Microsoft cuts
- Phil Spencer somehow thinks that Xbox has 'never looked stronger' as multiple games are canceled
- Three zero-day flaws in Ivanti CSA solutions were abused to grab login credentials
- The group likely sold the access to French government devices
- Researchers are attributing the attacks to Chinese state-sponsored miscreants
In late 2024, Chinese state-sponsored threat actors abused multiple zero-day vulnerabilities in Ivanti Cloud Services Appliance (CSA) devices to access French government agencies, as well as numerous commercial entities such as telcos, finance, and transportation organizations.
The news was recently confirmed by the French National Agency for the Security of Information Systems (ANSSI), which noted threat actors were abusing three security vulnerabilities in Ivanti CSA devices: CVE-2024-8963, CVE-2024-9380, and CVE-2024-8190.
All three were zero-days at the time, and all were used to steal login credentials and establish persistence on target endpoints. Apparently, the miscreants were deploying PHP web shells, modifying existing PHP scripts to inject web shell capabilities, and installing kernel modules that served as a rootkit.
Get 55% off Incogni's Data Removal service with code TECHRADAR
Wipe your personal data off the internet with the Incogni data removal service. Stop identity thieves
and protect your privacy from unwanted spam and scam calls.View Deal
The attacks were attributed to a group tracked as Houken which, in the past, was seen actively exploiting vulnerabilities in SAP NetWeaver to drop a variant of GoReShell backdoors called GOREVERSE.
This group, the researchers claim, bears many similarities to an entity tracked by Google’s Mandiant team as UNC5174.
"While its operators use zero-day vulnerabilities and a sophisticated rootkit, they also leverage a wide number of open-source tools mostly crafted by Chinese-speaking developers," French researchers said. "Houken's attack infrastructure is made up of diverse elements -- including commercial VPNs and dedicated servers."
Apparently, Houken isn’t exclusively focused on western targets. In the past, it was observed targeting a wide range of government and education organizations in Southeast Asia, China, Hong Kong, and Macau.
For Western targets, they were mostly focused on government, defense, education, media, and telecommunications.
It is also worth mentioning that in the French case, it is likely that there were multiple threat actors involved, with one group acting as an initial access broker, and a separate group purchasing that access to hunt for valuable intelligence and other sensitive data.
Via The Hacker News
You might also like- Critical Ivanti Cloud Service Appliance flaw exploited in the wild
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers
- Okta warns GenAI tool v0.dev is being exploited to build phishing sites
- The malicious sites are being hosted on Vercel infrastructure to appear more legitimate
- AI tools are also commonly citing false URLs, putting unsuspecting users at risk of attacks
New Okta research has revealed how threat actors are using Vercel's v0.dev to build realistic phishing sites which mimic legitimate sign-in pages, with researchers successful reproducing the alleged technique to prove its feasibility.
v0.dev allows users to create web interfaces from simple, natural language prompts, which researchers say is concerning because the technology has now been proven to lower the technical barrier for phishing attacks and other types of cybercrime.
Although Vercel and Okta have worked together to restrict access to known sites, many argue there's very little that can be done to prevent such attacks now AI tools have become so widespread.
GenAI is now creating phishing sitesOkta found the fake phishing sites to be impersonating company logos and other assets to reduce detection by unsuspecting victims, with the sites hosted on Vercel's infrastructure to appear more legitimate. Microsoft 365 and fake crypto sites were among the most popular.
The open source availability of v0.dev clones and guides on GitHub has also broadened access to these capabilities for less experienced developers and attackers.
Okta is recommending that all users set up multi-factor authentication on supported accounts, binding authenticators to original domains via tools like Okta FastPass to ensure that fake sites don't get access to your credentials.
"Organizations can no longer rely on teaching users how to identify suspicious phishing sites based on imperfect imitation of legitimate services," Okta's researchers noted.
Companies should also update their cybersecurity training programs to address risks from AI-generated phishing attacks and social engineering.
The news comes soon after another report revealed around one-third of GenAI chatbot responses containing login URLs were false, with attackers registering false domains that are cited by tools like ChatGPT to establish their own phishing campaigns.
You might also like- Protect your digital footprint by installing the best VPNs
- Consider using the best password managers and best authenticator apps
- AI is making phishing emails far more convincing with fewer typos and better formatting: Here's how to stay safe