New phishing scam campaign impersonates trusted Google services. Reportedly, over 10,000 emails are sent to around 3,200 ...
As we head into the New Year, experts across the tech landscape weigh in to share what they think will happen in 2026 ...
Legitimate Google services are, once again, being abused in phishing attacks, successfully tricking targets into clicking ...
This weekly recap brings those stories together in one place. No overload, no noise. Read on to see what shaped the threat ...
Taking action over a growing spy threat from Beijing is not about paranoia. It is about recognising power and vulnerability ...
Example of a PDF attachment with a QR code. Malicious QR codes commonly appear in mass phishing campaigns as well as targeted ...
Thanks to rapid advances in artificial intelligence, the cybercriminals seeking to dupe you into handing over your retirement ...
CertiK, the world’s largest Web3 security services provider, released its 2025 Skynet Hack3D Web3 Security Report, providing a comprehensive review of major security incidents and risk trends across ...
Proofpoint has warned about phishing campaigns abusing legitimate device authorization flow to bypass MFA and gain persistent ...
Multiple threat actors are compromising Microsoft 365 accounts in phishing attacks that leverage the OAuth device code authorization mechanism. Attackers trick victims into entering a device code on ...
LLM-Powered Social Engineering is reshaping crypto crime. Learn how AI-driven scams use personalized tactics, fake authority, and deep trust-building to drain wallets.
A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed with multiple threat clusters using the technique to gain unauthorized access to Microsoft 365 ...