NCSC advises on countermeasures for high-risk individuals over phishing attacks on encrypted messaging services, such as ...
Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device ...
CISA flagged two Roundcube Webmail vulnerabilities as actively exploited in attacks and ordered U.S. federal agencies to patch them within three weeks. Roundcube Webmail is a web-based email client ...
Quantum computing threatens the cryptography behind HTTPS certificates Fake certificates expose users to surveillance risks Transparency logs help detect unauthorized certificate issuance quickly ...
I write frequently about the threat of malware and how threat actors are using it to do everything from steal personal information to fully take over users' devices or add them to botnets. These ...