A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed with multiple threat ...
It showed that North Korea remains the biggest crypto threat actor, accounting for 60% of the funds stolen from January to ...
A new variant of the BeaverTail malware linked to North Korean hackers has been identified targeting cryptocurrency traders ...
The UK’s tax office has received 135,500 reports of suspected scams in the past 10 months including 4800 related to self ...
Join our webinar to understand the key highlights of the report that will help guide your 2026 identity security strategy ...
ISACA has been appointed by the US Department of Defense (DoD) as the global credentialing authority for the Cybersecurity ...
A prolific China-linked threat group is turning misconfigured servers in European government networks into relay nodes, in ...
The NASDAQ-listed company filed a notification to the Maine Attorney General’s Office that the personal information of more ...
A critical flaw in the Motors WordPress theme affecting more than 20,000 installations allows low-privileged users to gain ...
The technique, dubbed Lies-in-the-Loop (LITL), exploits the trust users place in confirmation prompts, turning a safeguard ...
Check Point has detected thousands of phishing emails in the past fortnight, offering fake promotions and special deals ...
Law enforcers from across Europe have come together to tackle a major Ukraine-based fraud operation said to have cost ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results