
Security
Police Arrest JokerOTP Seller in Multi-Year Phishing Investigation
2/11/2026

Vulnerabilities
Vulnerability exploits now dominate intrusions • The Register
1/29/2026

Security
Microsoft Strengthens Conditional Access Enforcement for Enhanced Security Posture
1/28/2026

Security
Azure TOTP Implementation Highlights Cloud-Native Security Advantages
1/27/2026

Security
Essential Okta Security Settings Often Overlooked by Enterprises
1/27/2026

Security
ShinyHunters Targets Canva, Atlassian in Global Okta Credential Theft Campaign
1/27/2026

Security
ShinyHunters Claims Responsibility for SSO Account Hijacking Campaign
1/24/2026

Security
Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
1/23/2026

Security
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
1/23/2026

Security
Cybercriminals Deploy Custom Phishing Kits to Automate IT Helpdesk Scams
1/22/2026

Cybersecurity
Attackers hijack SharePoint to phish energy sector with 600-email blasts
1/22/2026

Security
Filling the Most Common Gaps in Google Workspace Security
1/22/2026

Cybersecurity
Bank of England Report: UK Financial Sector Still Failing Basic Cybersecurity Controls
1/22/2026