In my most recent book, Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing,...
Blog
Your blog category
Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler...
A security analysis of the OvrC cloud platform has uncovered 10 vulnerabilities that could be chained to...
Advertising on TikTok is the obvious choice for any company trying to reach a young market, and...
Threat actors have been found leveraging a new technique that abuses extended attributes for macOS files to...
Google has revealed that bad actors are leveraging techniques like landing page cloaking to conduct scams by...
Cybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system that could allow...
A Vietnamese-speaking threat actor has been linked to an information-stealing campaign targeting government and education entities in...
In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted? Certificate revocations,...
Threat actors are exploiting Microsoft Visio files and SharePoint to launch two-step phishing attacks, according to researchers...