Threat actors are abusing the special-use ".arpa" domain and IPv6 reverse DNS in phishing campaigns that more easily evade ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
A new business cyber security report indicates 61 percent suffered a serious business disruption, including extortion in ...
Tycoon2FA has become a leading phishing-as-a-service (PhaaS) platforms, enabling campaigns that reach over 500,000 organizations monthly, prompting Microsoft’s Digital Crimes Unit (DCU) to work with ...
Phishing is one of the most common forms of cyber attack. It involves sending emails that appear legitimate in order to trick ...
PCWorld reports that AI-powered phishing scams now use personalized data from breaches and social media to create convincing ...
Nominations for second-quarter 2026 are open; submit a nomination today. Robert Ballard, information security engineer in ...
Understanding a client’s specific cyber exposure — and raising cyber insurance throughout the policy term — can go a long way in helping sell the product, an industry professional said last week ...
Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a ...
The Google Threat Intelligence Group says it found an iPhone exploit kit that could crack the device and sniff out crypto wallets, apps and seed phrases to steal funds.
Researchers have found that attackers are abusing OAuth to send users from legitimate Microsoft or Google login pages to phishing sites or malware downloads.
A Europol-led sting against the infamous Tycoon2FA MFA-bypass phishing service has been successful, with operations disrupted and ringleaders and cyber criminal users identified.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results