News

Threat actors are exploiting Vercel's AI tool to generate convincing phishing pages. Read Vercel’s response and Okta’s tips ...
Cybersecurity researchers find that OpenAI’s model produces incorrect URLs when asked where to log in to popular brands, ...
After taking preventative courses, some employees are actually more likely to click on scam links arriving in their inbox, ...
Social Security phishing scams use urgency and impersonation to steal personal data. Learn how to spot fake SSA emails and ...
Microsoft 365 and Outlook users are being targeted by a tactic that injects fake billing alerts directly into their calendars ...
The .es domains that host the malicious content, like the fake Microsoft sign-in portals, are in most cases randomly ...
Check Point discovered around 500 suspected Scattered Spider phishing domains, suggesting the group is preparing to expand ...
The phishing industry is a never ending source of innovation. Cyber fraudsters are determined to sneak their way into your ...
Phishing campaigns use PDF attachments and callback phishing to exploit brands like Microsoft and DocuSign, affecting ...
As organizations consider strategies to strengthen their security postures, the following components are key to creating an ...
The Atomic macOS Stealer malware has a new backdoor persistent installation feature, making it even more of a security risk ...