Top 10 Best Multi-Factor Authentication (MFA) Providers in 2026
In the digital realm of 2026, the traditional password stands as a flimsy barrier against an onslaught of sophisticated cyber threats. From phishing campaign...
Articles mapped to MITRE ATT&CK techniques. Select a technique to view matching articles.
133 articles found
In the digital realm of 2026, the traditional password stands as a flimsy barrier against an onslaught of sophisticated cyber threats. From phishing campaign...
In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in phishing, PC mal...
Hackers are increasingly using fake Zoom and Microsoft Teams meetings to trick victims into infecting their own systems with malware. SEAL says it has blocke...
Phishing evolves into AI-driven, multi-channel scams abusing trusted platforms.
A phishing campaign that bypasses the standard 15-minute expiration window through automation and dynamic code generation, leveraging the OAuth Device Code A...
Threat actors are abusing legitimate remote monitoring and management (RMM) tools LogMeIn Resolve and ScreenConnect in a multi‑stage phishing campaign that b...
In this Help Net Security video, Andrew Williams, Senior Product Manager at Mimecast, walks through the company’s API-based email security protection for Mic...
BleepingComputer reports that device code phishing intrusions have increased by 37.5 times so far this year.
DPRK-linked hackers use GitHub C2s, starting attacks via phishing LNK files that drop a PDF and PowerShell script in South Korea. North Korea-linked threat a...
New Phishing scam uses fake missile alerts and the ongoing conflict involving Iran to target users with QR codes and fake government emails to steal Microsof...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation. This campaign goes beyond tradi...
This latest scam is a variation of previous toll and parking ticket scams, but instead of links, it features an image of a fake court notice with an embedded...
Attacks on email that exploit OAuth consent, lateral phishing, and AI payroll fraud top the list.
In one of his recent diaries, Johannes discussed how open redirects are actively being sought out by threat actors[1], which made me wonder about how commonl...
Scammers are sending fake "Notice of Default" traffic violation text messages impersonating state courts across the U.S.
Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more than 37 times this year.
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid-2025, following a two-year period of minimal ta...
The campaign leverages a newly-discovered phishing kit called VENOM.
Hackers are increasingly exploiting trusted online platforms to launch sophisticated phishing campaigns targeting bank users in the Philippines. Despite ongo...
A large-scale credential theft campaign targeting senior executives has been linked to a previously unknown automated phishing platform called Venom