A devious, new phishing technique allows adversaries to bypass multi-factor authentication (MFA) by secretly having victims log into their accounts…
Blog
Security experts are warning of large-scale business email compromise, or “BEC-as-a-service,” campaigns after blocking thousands of attacks in the fourth…
A new version of the CryptBot info stealer was seen in distribution via multiple websites that offer free downloads of…
A new malware called Xenomorph distributed through Google Play Store has infected more than 50,000 Android devices to steal banking information. Still…
As a journalist working for the Arab news network Alaraby, Rania Dridi said she’s taken precautions to avoid being targeted…
Are you looking for a more secure way of sending emails within Gmail? Google’s “Confidential mode” is designed to ensure…
Code hosting platform GitHub today launched new machine learning-based code scanning analysis features that will automatically discover more common security…
Security researchers warn that some attackers are compromising Microsoft Teams accounts to slip into chats and spread malicious executables to…
Jim Alkove is the Chief Trust Officer at Salesforce, where he’s responsible for enterprise-wide information security and compliance. It’s a familiar…
Cybersecurity needs collaborations across sectors and borders, participants in Ireland’s business group Ibec’s Cybersecurity Summit agreed. The inherent insecurity of…