
AI-driven phishing attacks outpace legacy email security filters
A report published by Cofense examines the growth of artificial intelligence (AI) in phishing attacks and the resultant challenges for traditional email security.
According to the report, titled The Rise of AI – A New Era of Phishing Threats, the Cofense Phishing Defense Center tracked one malicious email bypassing traditional defences every 42 seconds in 2024. These emails were often linked to polymorphic phishing attacks, which change in real-time in an attempt to evade detection by standard filtering technology.
The research found significant changes in attacker tactics attributed to AI. Attackers have increasingly automated the development of malware, extended attacks across various industries, and generated more personalised phishing content. These adaptations have allowed threats to bypass standard email security tools and highlighted what the report describes as the insufficiency of perimeter-only defences.
Josh Bartolomie, Chief Security Officer at Cofense, said, "Phishing threats have reached a critical turning point, AI-driven attacks are now slipping past traditional perimeter defenses, exposing the limits of legacy email filters. Attackers are leveraging AI to generate realistic lures at scale, harvest public data to fine-tune their approach, and continuously evolve campaigns mid-stream. The speed and sophistication we're seeing demands a new mindset around email security—one that goes beyond filters to focus on visibility, validation, and rapid, human-informed response."
Polymorphic attacks, which adapt key details such as subject lines, sender identities, and content, are creating what analysts describe as an unprecedented challenge for defenders. Cofense notes that these tactics now require security teams to combine expert-supervised AI with behavioural context analysis, offering greater accuracy in identifying threats that evade legacy filters.
The report also identifies a notable rise in business email compromise (BEC). Attackers have begun using AI tools to impersonate executives, replicate authentic email threads, and reference genuine business processes such as payment approvals. These messages are often sent from domains that closely resemble legitimate addresses such as "@consultant.com". The use of AI also reduces common indicators of phishing, such as poor grammar or inconsistent formatting, complicating detection by human recipients.
The report highlights five principal trends shaping the current phishing landscape. Firstly, over 40% of malware detected in 2024 was newly identified, with nearly half classified as Remote Access Trojans (RATs). RATs provide persistent access for attackers and indicate a shift towards more sophisticated, multipurpose threats.
Secondly, attackers are now using AI to develop phishing messages that closely mimic internal company communications, demonstrating improved grammar and tone. Cofense's systems detected and grouped these emails using a combination of expert oversight and real-time input from users.
A third trend is the 70% year-over-year increase in email-based scams, associated with AI-driven automation of targeted lures, inbound message spoofing, and the use of subtle text variations to evade spam filters.
The fourth area of concern is the continued effectiveness of polymorphic campaigns. These campaigns continuously alter email elements to bypass perimeter security, prompting the report's recommendation for enhanced post-delivery monitoring and rapid incident response.
An expansion in attacker strategies comprises the fifth trend. Tax-related scams increased by 340%, and cases involving the misuse of legitimate files to deliver malware rose by 575%. Additionally, incidents of Microsoft-related email spoofing reported a 156% increase, indicating attackers' efforts to diversify their tactics and reduce the effectiveness of pattern-based blocking approaches.
The report is based on intelligence collected by the Cofense Phishing Defense Center during 2024 and incorporates data from millions of real-world phishing threats reported by over 35 million trained users worldwide.
Cofense has indicated that it will remain focused on providing defences that go beyond filtering, blending AI oversight, human intelligence, and post-delivery detection measures to support organisations in countering these threats.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
29 minutes ago
- Yahoo
EVONET Launches Cross-Border Wallet Connectivity Service in Partnership with au PAY
— Enabling WeChat Pay Users to Pay at au PAY Merchants in Japan SINGAPORE, June 10, 2025 /PRNewswire/ -- EVONET Global Pte., Ltd. (Headquarters: Singapore, hereafter "EVONET") has launched a cross-border mobile wallet interoperability service in partnership with KDDI Corporation (Headquarters: Chiyoda-ku, Tokyo, hereafter "KDDI") and Tenpay Payment Technology Co., Ltd. (Headquarters: Shenzhen, China, hereafter "Tenpay"). In the first phase of this initiative, more than 1.4 billion WeChat users from China can make payments by WeChat Pay (Weixin Pay) at au PAY-affiliated stores across Japan by simply scanning the QR codes installed at the stores (MPM method: Merchant-Presented Mode). This enables inbound travelers from China to enjoy a seamless payment experience across Japan using their familiar WeChat app, without worrying about language or currency barriers. Japan welcomes tens of millions of inbound tourists annually, but differences in payment systems have been a significant inconvenience. With this collaboration, merchants do not need to install new systems or make complex configuration changes, enabling them to easily accept WeChat Pay users and capture inbound demand. "This marks the first time that KDDI is opening its au PAY merchant network to non-Japanese users. EVONET provides the technological platform that underpins this global collaboration, serving as a hub to address the complexities of international payment infrastructure." said James Zhao, chief executive officer of Evonet Global Pte., Ltd. Going forward, EVONET plans to expand its network by partnering with more mobile wallet providers across Asia. In addition to the MPM method, the company also plans to support the CPM method (Consumer-Presented Mode), where merchants scan the user's QR code, enabling more flexible payment options suited to various business types. EVONET aims to build an open network that allows multiple wallet operators to connect seamlessly across countries and regions, enabling users to pay easily using their regular mobile apps wherever they are. In the future, the company also envisions enabling Japanese users to make outbound payments at overseas merchants using their domestic mobile wallets, thereby enhancing global payment convenience. EVONET will continue to serve as a global bridge in mobile payments, delivering more seamless and valuable payment experiences for both users and merchants. About EVONET GLOBAL PTE., is a network service provider headquartered in Singapore, jointly planned and promoted by Shanghai CardInfoLink Data Service Co., LTD. The company provides merchant network access services for various mobile code payment wallets around the world. In addition to transaction processing between wallets and acquiring operators, EVONET also performs settlement and currency conversion to realize cross-border QR code payments. Future services will include international remittance and wallet top-up features. Media Contact:David Thoms | Marketing Manager+852 2663 3068 | media@ Learn more: View original content: SOURCE EVONET GLOBAL PTE LTD


Free Malaysia Today
29 minutes ago
- Free Malaysia Today
Gerik bus tragedy deadliest crash in over 10 years
The fatal bus crash that killed 15 students from Universiti Pendidikan Sultan Idris early this morning was the deadliest since August 2013. (Bernama pic) PETALING JAYA : The fatal bus crash that took the lives of 15 students from Universiti Pendidikan Sultan Idris (UPSI) in Gerik early this morning is the country's deadliest in over a decade. The crash, which is believed to have occurred between 12.30am and 1am, also involved a multi-purpose vehicle (MPV) which was hit by the bus as it lost control and landed on its side along the East-West Highway near Tasik Banding. Another 27 students, the bus driver and his assistant, as well as the four people in the MPV were all injured. It is the worst crash since an express bus carrying 53 passengers, veered off the road and plunged into a 60-metre ravine off Jalan Genting, in Genting Highlands, on Aug 21, 2013, killing 37 people. That incident remains the most devastating bus tragedy in the nation's history, Bernama reported. Today's accident also brought to mind past tragedies, involving buses, that claimed numerous lives. – On Dec 20, 2010, a tour bus carrying Thai tourists lost control and went over the road divider to the opposite lane, and overturned into a ditch. The number of fatalities was 27, the majority of whom were foreign tourists, while several others sustained serious injuries. – On Aug 13, 2007, a total of 20 passengers were killed and nine others critically injured after the express bus they were travelling in lost control and overturned at Km229 on the North-South Expressway (PLUS) near Bukit Gantang, Perak. – On Dec 24, 2016, 14 people died and 16 were injured when an express bus plunged down a 10-metre slope at Km137.3 on the PLUS highway, northbound near the Pagoh rest and recreation area in Johor. – On Nov 23, 2003, 14 people died and 30 were injured when two buses collided at Km68 on the Lipis-Merapoh Road near the Pahang-Kelantan border. – On Oct 10, 2010, 12 people were killed and more than 40 were injured in a collision involving two buses, a van, and three cars at Km223 on the PLUS highway near the Simpang Ampat toll plaza in Alor Gajah, Melaka. – On Dec 26, 2009, 10 passengers were killed and two others injured, including one critically, when a double-decker bus lost control and collided with the road divider at Km272.8 on the PLUS highway, northbound, near the Ipoh Selatan Toll Plaza in Ipoh, Perak.


Geeky Gadgets
30 minutes ago
- Geeky Gadgets
Get iOS 26 Beta 1: Your Step-by-Step Download Guide
The release of the iOS 26 beta offers users an exclusive opportunity to explore Apple's latest operating system before its official launch. This early access allows you to experience new features and improvements firsthand. However, installing beta software requires careful preparation and an understanding of the potential risks. The video below from Matt Talks Tech provides a detailed walkthrough to help you download and install the iOS 26 beta safely and efficiently. Watch this video on YouTube. Step-by-Step Process for Installing iOS 26 Beta To begin your journey with the iOS 26 beta, follow these steps carefully: Verify Device Compatibility: Ensure your device is eligible for the iO S26 beta. Apple typically restricts beta access to newer models. You can check the compatibility list on Apple's official website to confirm. Ensure your device is eligible for the iO S26 beta. Apple typically restricts beta access to newer models. You can check the compatibility list on Apple's official website to confirm. Join the Beta Program: Navigate to the Apple Beta Software Program website and log in using your Apple ID. Once enrolled, you'll gain access to the beta profile required for installation. Navigate to the Apple Beta Software Program website and log in using your Apple ID. Once enrolled, you'll gain access to the beta profile required for installation. Download the Beta Profile: After enrolling, download the beta profile directly onto your device. This profile is essential for accessing the beta software. After enrolling, download the beta profile directly onto your device. This profile is essential for accessing the beta software. Install the Beta Profile: Open your device's settings, locate the downloaded beta profile, and follow the prompts to install it. Restart your device to complete this step. Open your device's settings, locate the downloaded beta profile, and follow the prompts to install it. Restart your device to complete this step. Update to iOS 26 Beta: After restarting, go to 'Settings > General > Software Update.' The iOS 26 beta should appear as an available update. Download and install it. The process may take some time, depending on your internet speed and device performance. Key Requirements for Installation Before proceeding with the installation, ensure your device meets the necessary requirements to avoid interruptions or issues: Device Compatibility: Only newer Apple devices are typically supported. Older models may not qualify for the beta program. Only newer Apple devices are typically supported. Older models may not qualify for the beta program. Available Storage Space: Check that your device has sufficient free storage to accommodate the beta installation. Check that your device has sufficient free storage to accommodate the beta installation. Reliable Wi-Fi Connection: A stable internet connection is crucial to prevent download interruptions. A stable internet connection is crucial to prevent download interruptions. Battery Life: Ensure your device has at least 50% battery charge or is connected to a power source throughout the update process. Precautions to Take Before Installing Beta Software Beta versions of operating systems are experimental and may contain bugs or incomplete features. To safeguard your data and minimize disruptions, consider these precautions: Back Up Your Device: Use iCloud or iTunes to create a full backup of your device. This ensures you can restore your data if the beta causes any issues. Use iCloud or iTunes to create a full backup of your device. This ensures you can restore your data if the beta causes any issues. Use a Secondary Device: If possible, install the beta on a secondary device. This prevents potential disruptions to your primary device in case of instability or bugs. If possible, install the beta on a secondary device. This prevents potential disruptions to your primary device in case of instability or bugs. Understand the Risks: Be aware that beta software may lead to performance issues, app crashes, or compatibility problems with third-party applications. Common Risks and Challenges While the iOS 26 beta offers a glimpse into Apple's latest advancements, it's essential to be prepared for potential challenges: Performance Issues: Beta versions may cause slower performance, unexpected behavior, or frequent app crashes. Beta versions may cause slower performance, unexpected behavior, or frequent app crashes. Data Loss: There is a risk of losing data during the installation process, which is why creating a backup is critical. There is a risk of losing data during the installation process, which is why creating a backup is critical. App Compatibility: Some third-party apps may not function properly with the beta software, leading to usability issues. Some third-party apps may not function properly with the beta software, leading to usability issues. Reverting to Stable iOS: If the beta proves too unstable, you may need to restore your device to the latest stable version of iOS, which can be time-consuming. Apple encourages beta users to report bugs and provide feedback through the built-in feedback tools. This helps improve the software before its official release. Troubleshooting Installation Issues If you encounter problems during the installation process, try these troubleshooting steps: Verify Internet and Storage: Ensure your device has a stable internet connection and enough free storage space for the update. Ensure your device has a stable internet connection and enough free storage space for the update. Restart Your Device: If the installation fails, restart your device and attempt the update again. If the installation fails, restart your device and attempt the update again. Reinstall the Beta Profile: Remove the beta profile from your device, download it again, and retry the installation process. Remove the beta profile from your device, download it again, and retry the installation process. Restore from Backup: If all else fails, use the backup you created earlier to restore your device to its previous state. By following these steps, you can address common issues and ensure a smoother installation experience. Exploring the iOS 26 Beta Installing the iOS 26 beta provides a unique opportunity to explore Apple's latest features and enhancements ahead of the official release. By adhering to the outlined steps, meeting the necessary requirements, and taking appropriate precautions, you can minimize risks and enjoy a seamless experience. Remember, beta software is inherently experimental, so approach it with caution and be prepared to troubleshoot any challenges that arise. With proper preparation, you can make the most of this early access to Apple's newest operating system. Uncover more insights about iOS 26 beta download in the previous articles we have written. Source & Image Credit: Matt Talks Tech Filed Under: Apple, Apple iPhone, Guides Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.