News

Threat actors continue to develop and leverage various techniques that aim to compromise cloud identities. Despite ...
A tailored phishing campaign runs on personal information. Taking employees’ personal information out of circulation deprives ...
An entire cottage industry has formed around phishing attacks that bypass some of the most common forms of multifactor authentication (MFA) and allow even non-technical users to quickly create sites ...
The tech-savvy head of Instagram says he almost fell for an elaborate scam in which a new phishing attack was posing as ...
Retail has become the UK's most targeted sector for cyber crime, driven by outdated systems and vulnerable customer data ...
Thousands of pupils attended schools in Edinburgh on Saturday in order to reset their IT network passwords, after a phishing attack left them ... Exploring new side effect of weight-loss drug ...
The digital landscape has evolved dramatically in 2025, with social media platforms becoming increasingly central to both ...
Third-party supply chain attacks are the second most-cited cybersecurity risk for chief information security officers out of ...
In its State of AI Cybersecurity 2025 report, AI cybersecurity vendor Darktrace asked 1,500 cybersecurity IT professionals ...
New research from Verizon points to a startling growth in data breaches involving third parties. According to the Verizon ...
The NCSC and its partner agencies have blown the whistle on an extensive campaign of malicious cyber attacks orchestrated by the Russian state Fancy Bear operation.