Multi-factor authentication (MFA) is a foundational security control, but attackers are increasingly bypassing it using MFA Push...
phishing
Check Point Research has uncovered a sophisticated phishing campaign leveraging Google Firebase to host fraudulent pages mimicking...
ESET researchers have uncovered a significant evolution in the operations of the Telekopye cybercriminal network, which has...
The second half of 2024 has seen significant shifts in the cyberthreat landscape, according to ESET’s latest...
As organizations prepare for seasonal breaks, cybercriminals are actively planning attacks. The holiday period often sees a...
A recent study by Acronis Threat Research Unit reveals critical security gaps in Microsoft 365 backup data,...
TL;DR Malicious macros remain a significant threat, with Microsoft Office being a common attack vector. Updated guidance...
In today’s increasingly remote and mobile workforce, securing end-user devices has become a critical challenge for organizations....
In the ever-evolving landscape of cybersecurity, phishing attacks remain one of the most pervasive threats to organizations...
Major events, such as international sporting competitions, cultural festivals, and large-scale conferences, are increasingly becoming targets for...
In a significant cybersecurity development, Kaspersky has uncovered evidence suggesting that two known threat activity clusters, Head...