<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Phishing-as-a-Service on ThreatNeuron</title>
    <link>https://thethreatneuron.in/tags/phishing-as-a-service/</link>
    <description>Recent content in Phishing-as-a-Service on ThreatNeuron</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 ThreatNeuron</copyright>
    <lastBuildDate>Wed, 08 Apr 2026 12:18:09 +0530</lastBuildDate><atom:link href="https://thethreatneuron.in/tags/phishing-as-a-service/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>AI Cyberattacks 2026: How Attackers Weaponize Every Stage</title>
      <link>https://thethreatneuron.in/blog/ai-weaponized-cyberattack-lifecycle-tycoon2fa-2026/</link>
      <pubDate>Wed, 08 Apr 2026 12:18:09 +0530</pubDate>
      
      <guid>https://thethreatneuron.in/blog/ai-weaponized-cyberattack-lifecycle-tycoon2fa-2026/</guid>
      <description>Threat actors are embedding AI into every phase of the cyberattack lifecycle — from reconnaissance to data exfiltration. This post breaks down how platforms like Tycoon2FA exploit AI for phishing at scale, what the weaponized attack lifecycle actually looks like, and where defenders should focus their resources.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://thethreatneuron.in/blog/ai-weaponized-cyberattack-lifecycle-tycoon2fa-2026/featured.png" />
    </item>
    
    <item>
      <title>AI Device Code Phishing: Bypassing MFA at Scale</title>
      <link>https://thethreatneuron.in/blog/ai-device-code-phishing-bypass-mfa-attacks-2026/</link>
      <pubDate>Tue, 07 Apr 2026 18:00:00 +0530</pubDate>
      
      <guid>https://thethreatneuron.in/blog/ai-device-code-phishing-bypass-mfa-attacks-2026/</guid>
      <description>Device code phishing has become the go-to technique for AI-powered campaigns that sidestep multi-factor authentication entirely. This post breaks down how the attack works, why AI makes it dramatically more effective, and what defenders can do right now.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://thethreatneuron.in/blog/ai-device-code-phishing-bypass-mfa-attacks-2026/featured.png" />
    </item>
    
  </channel>
</rss>
