<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Four grand.]]></title><description><![CDATA[<p>Four grand. That's what it costs a random kid with a laptop to run a voice phishing operation that used to require a call center, a phisher, and a developer. ATHR packages all of it into one dashboard, tosses in AI voice agents that can ad-lib when a victim gets suspicious, and ships with ready-made lures for Google, Microsoft, Coinbase, Binance, and a few more.</p><p>CyberCrime has a SaaS model now, complete with commission splits (10% of profits back to the vendor). The barrier to running a convincing vishing campaign just collapsed, and your awareness training still says "watch for typos in the email."</p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f399.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--studio_microphone" style="height:23px;width:auto;vertical-align:middle" title="🎙" alt="🎙" />️ AI agents handle objections live, so the "support rep" sounds real because they are, functionally, reasoning<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4e7.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--e-mail" style="height:23px;width:auto;vertical-align:middle" title="📧" alt="📧" /> Lure emails are customized per target with accurate IPs, dates, locations, and pass authentication checks<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f3e6.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--bank" style="height:23px;width:auto;vertical-align:middle" title="🏦" alt="🏦" /> Eight brands supported out of the box, crypto exchanges heavily represented for obvious reasons<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f6e1.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--shield" style="height:23px;width:auto;vertical-align:middle" title="🛡" alt="🛡" />️ Stop looking at email indicators, start modeling normal communication patterns and flag the anomalies</p><p>If your vishing defense is a 20-minute annual training video and a phish-report button, you're bringing a knife to a drone fight. The humans on the other end of the phone aren't humans anymore, and they don't get tired, rattled, or bored on calls.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.bleepingcomputer.com/news/security/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks/" title="New ATHR vishing platform uses AI voice agents for automated attacks">
<img src="https://www.bleepstatic.com/content/hl-images/2026/04/16/Robot.jpg" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.bleepingcomputer.com/news/security/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks/">
New ATHR vishing platform uses AI voice agents for automated attacks
</a>
</h5>
<p class="card-text line-clamp-3">A new cybercrime platform called ATHR can harvest credentials via fully automated voice phishing attacks that use both human operators and AI agents for the social engineering phase.</p>
</div>
<a href="https://www.bleepingcomputer.com/news/security/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.bleepstatic.com/favicon/bleeping.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />





<p class="d-inline-block text-truncate mb-0">BleepingComputer <span class="text-secondary">(www.bleepingcomputer.com)</span></p>
</a>
</div><p></p><p><a href="https://infosec.exchange/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Vishing" rel="tag">#<span>Vishing</span></a> <a href="https://infosec.exchange/tags/AI" rel="tag">#<span>AI</span></a> <a href="https://infosec.exchange/tags/security" rel="tag">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" rel="tag">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" rel="tag">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/445/750/999/878/729/original/7f5929749c051e80.jpeg" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/a3075ca4-53d0-45c6-9aad-c14b7999e297/four-grand.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 06:45:40 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a3075ca4-53d0-45c6-9aad-c14b7999e297.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 22 Apr 2026 01:25:53 GMT</pubDate><ttl>60</ttl></channel></rss>