Okta Uncovers Custom Phishing Kits Built for Vishing Callers
Image: Unsplash Phone scammers have achieved an unwelcome breakthrough, combining traditional phishing websites with real-time voice manipulation in ways that...
Image: Unsplash Phone scammers have achieved an unwelcome breakthrough, combining traditional phishing websites with real-time voice manipulation in ways that...
Vulnerabilities disclosed this week in MCP servers from Anthropic and Microsoft put a spotlight on security concerns about a protocol...
Microsoft users across the U.S. experienced widespread disruptions Thursday after a technical failure prevented people from sending or receiving email...
U.S. CISA adds Prettier eslint-config-prettier, Vite Vitejs, Versa Concerto SD-WAN orchestration platform, and Synacor Zimbra Collaboration Suite flaws to its Known...
Investigation underway after 72M Under Armour records surface online Pierluigi Paganini January 23, 2026 Under Armour is investigating a data...
Let’s get something out of the way: retrospectives can feel a bit like mandatory fun. Someone gathers up the year’s...
Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now...
Red Teaming has become one of the most discussed and misunderstood practices in modern cybersecurity. Many organizations invest heavily in...
Cloud-native applications have changed how businesses build and scale software. Microservices, containers, and serverless architectures enable faster and more flexible...
Decade-long transformation While the parliamentary vote signals political commitment to reducing technology dependencies, analysts warn that the shift will require...
Ravie LakshmananJan 23, 2026Network Security / Vulnerability Fortinet has officially confirmed that it's working to completely plug a FortiCloud SSO...
Ravie LakshmananJan 23, 2026Regulatory Compliance / National Security TikTok on Friday officially announced that it formed a joint venture that...
Ravie LakshmananJan 23, 2026Email Security / Endpoint Security Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages...
Microsoft has warned of a multi‑stage adversary‑in‑the‑middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the...
Image generated by Google Gemini A sophisticated new malware campaign is systematically dismantling Windows security defenses with alarming success—and it...