News

ESET warns that at least two Russian hacking groups are using the zero-day flaw in WinRAR for cyberespionage purposes.
Native phishing turns trusted tools into attack delivery systems. Varonis shows how attackers weaponize Microsoft 365 apps, ...
From the halls of Black Hat to breaking developments around the globe, these were the most alarming revelations that shook ...
Phishing attacks are getting more advanced by the day. To help protect yourself against them, we'll provide information about ...
Worried about scam and fraud calls? Samsung is bringing a tool to One UI 8 that can apparently detect voice phishing.
The “spoofing” email led to the gargantuan sum getting accidentally transferred to a TD Bank account posing as the Battery ...
Microsoft phishing scams use fake security alerts and links that redirect to credential-stealing pages with warning signs, ...
Social Security phishing scams use urgency and impersonation to steal personal data. Learn how to spot fake SSA emails and implement 10 protective measures.
Note: All product and company names mentioned herein are for identification purposes only and are the property of, and may be ...
Threat actors are exploiting Vercel's AI tool to generate convincing phishing pages. Read Vercel’s response and Okta’s tips for keeping your organization secure.
If you’ve received emails that appear to come from Mozilla, you should avoid clicking on any links within those emails.
Library patrons are being targeted by scammers claiming to be with The Library Network, a cooperative that connects dozens of ...