News

Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called ...
Attackers use business email compromise to pretend to be company executives, vendors, or other trusted parties and trick ...
The cyber assault by Pakistan-aligned actors began on April 17, weeks before India's counterterrorism strikes under Operation ...
Imagine getting a video call from your boss who’s asking for an urgent money transfer or sensitive company information — it’s the person’s voice and face on the call but something seems off. This is ...
Trustifi has raised $25 million in Series A funding to accelerate its product roadmap and go-to-market initiatives.
Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages.
TAG-110 abandoned HTA-based payloads in January 2025, using macro-enabled Word templates to target Tajik institutions.
Plus: An Iranian man pleads guilty to a Baltimore ransomware attack, Russia’s nuclear blueprints get leaked, a Texas sheriff ...
Mobile security has long been an afterthought in enterprise environments. While we’ve invested heavily in protecting ...
You know that little voice in your head? The one that whispers, “Wait a second…” when an email looks almost right, or a text ...