For $40, you can buy stolen police and government email accounts

One of the key tools that helps users distinguish between genuine messages and phishing attacks, especially through email, is the ability to distinguish between real government accounts and malicious…
Flaw in Gemini CLI AI coding assistant allowed stealthy code execution

Tools based on large language models, colloquially termed AI, have become an important part of the workflow of many individuals and enterprises in the tech sector. One such area where enthusiasts…
Google Gemini flaw hijacks email summaries for phishing

Google Gemini for Workspace is an automation tool that allows Google’s Gemini LLM to interact directly with various workplace tasks, including user inboxes. Because Gemini is a Google product being…
US Homeland Security warns of escalating Iranian cyberattack risks

This past week, tensions between the United States and Iran have escalated into full scale conflict as the United States and Israel conducted air strikes against Iran’s nuclear testing facilities. As…
Hacktivist Groups Transition to Ransomware-as-a-Service Operations

In cybersecurity, we tend to classify threat actors along strict boundaries. One such boundary is that between politically motivated hacktivists and financially motivated cybercriminals. In…
Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

AI agents are growing increasingly effective at operating within public digital space, and perhaps no one example demonstrates this as well as the Claude chatbot, created by the company Anthropic….
Deceptive Signatures: Advanced Techniques in BEC Attacks

Business Email Compromise (BEC) is one of the most common forms of cyberattack targeting the modern organization. At its most basic level, the technique is simply one of impersonation, attempting to…
No, you’re not fired – but beware of job termination scams

In recent months, hiring scams involving fake job interviews have been in the public eye. In such scams, threat actors induce the target to download malicious programs under the pretext of giving…
Phishing evolves beyond email to become latest Android app threat

Phishing has always been a multifaceted threat, but in the public perception, phishing is usually tied up with email. The process, as stereotyped, is clear: a fraudster sends an email with a bogus…
Future of Cybersecurity: Will XDR Reshape SIEM & SOAR?

The cybersecurity realm is known as a constantly evolving paradigm with a future so vast it can be hard to predict where it will go. One of the most common apparatuses that companies use to interact…