New Phishing Scam Uses LiveChat to Pose as Amazon and PayPal
Cofense researchers have found a new phishing scam where threat actors use LiveChat software to impersonate brands like Amazon and PayPal. By chatting with victims…
Cofense researchers have found a new phishing scam where threat actors use LiveChat software to impersonate brands like Amazon and PayPal. By chatting with victims…
The cloud is home to a dizzying amount of data. According to Cybersecurity Ventures, nearly half of the world’s data exists in external data centers,…
NinjaOne has unveiled NinjaOne Vulnerability Management, a new solution that helps IT teams identify, prioritize, and remediate vulnerabilities faster, without relying on periodic scans from…
In recent years, ClickFix and fake CAPTCHA techniques have become a popular way for cybercriminals to distribute malware. Instead of exploiting a technical vulnerability, these…
If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. A pentest…
Companies House, the UK’s business registrar, has successfully rebooted its online WebFiling service after it emerged that a previously-unknown cyber security issue exposed various data…
Tensions between China and Costa Rica have intensified following allegations tied to an ICE cyberattack that Costa Rican authorities say was linked to the cyberespionage group UNC2814. The…
A large-scale malicious campaign tied to GlassWorm has expanded within the ecosystem of open VSX extensions, introducing a method of spreading malware through developer tools. Researchers identified at least…
Superloop has continued its push to incorporate AI into its operation with a new system that will see its legacy billing platforms consolidated into a…
Former Germany’s foreign intelligence VP hit in Signal account takeover campaign Pierluigi Paganini March 16, 2026 Former BND VP Arndt Freytag von Loringhoven was targeted…
Hackers breached the Canadian process-outsourcing giant Telus Digital and may have accessed data belonging to the firm’s customers, which include major telecommunications, financial services, healthcare…
Cybersecurity is entering “a new phase” as artificial intelligence tools have matured and given IT defenders significantly less time to respond to cyberattacks and other…