Microsoft 365 Direct Send Exploited for Internal Phishing: What You Need to KnowThreat actors are now abusing a legitimate feature of Microsoft [...]
What Business Email Compromise Looks Like Today—and How to Stop ItBusiness Email Compromise (BEC) is one of the most syndicate-driven [...]
What Israel’s Strikes on Iran Mean for Threat Intelligence and Business CybersecurityIsrael Iran cybersecurity risks: The recent military strikes between Israel [...]
Qualcomm Chip Exploits and Patch Guidance: What IT Leaders Must KnowQualcomm chip exploits and patch guidance are critical to stay [...]
Phishing-as-a-Service: The Rise of DIY CybercrimePhishing attacks are no longer the work of lone hackers [...]
Nation-State-Linked Attack Targets Thousands of ASUS Routers with Persistent BackdoorA sophisticated cyber campaign is silently compromising thousands of ASUS [...]
Attackers Are Exploiting Microsoft Teams for Internal PhishingA new tactic is turning trusted collaboration tools into delivery [...]
QR Code Phishing Is Spreading Across Physical and Digital ChannelsA look at how cybercriminals are turning QR codes into [...]