All Articles
THIS MONTHBrowse all curated articles across categories
From transparency to action: What the latest Microsoft email security benchmark reveals
Microsoft's Latest Email Security Benchmark Highlights Defender's Strengths
US disrupts SocksEscort proxy network powered by Linux malware
HIGHUS and European Agencies Dismantle SocksEscort Proxy Network Exploiting Linux Malware
CRITICAL: Veeam warns of critical flaws exposing backup servers to RCE attacks
CRITCritical RCE Vulnerabilities Patched in Veeam Backup & Replication
Detecting and analyzing prompt abuse in AI tools
Understanding and Mitigating AI Prompt Abuse
ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
HIGHWeekly Security Bulletin Highlights Emerging Threats and Old Tricks
How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs
HIGHScaling Phishing Detection: A Strategic Guide for CISOs
Going the Extra Mile: Travel Rewards Turn into Underground Currency.
HIGHStolen Airline Miles Fuel Underground Market as Tradable Currency
Telus Digital confirms breach after hacker claims 1 petabyte data theft
HIGHTelus Digital Breach: Hacker Claims 1 Petabyte Data Theft
Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload
HIGHPhishing Campaigns Now Target SOC Workloads, Not Just Employees
US charges another ransomware negotiator linked to BlackCat attacks
HIGHUS Charges Ex-DigitalMint Employee for BlackCat Ransomware Collusion
CRITICAL: Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
CRITApple Patches WebKit Flaw in Older Devices Amid Coruna Exploit Concerns
CRITICAL: Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
CRITNew Android Malware Families Threaten Financial and Crypto Security