2 min read
Hackers use Evilginx to steal MFA-protected sessions
A growing number of phishing campaigns are now using reverse proxy tools to capture login tokens from cloud identity platforms.
Read More
2 min read
A growing number of phishing campaigns are now using reverse proxy tools to capture login tokens from cloud identity platforms.
Read More
2 min read
Kansas City behavioral health center announces September 2025 data breach.
2 min read
Richmond Behavioral Health Authority has disclosed a ransomware attack affecting 113,232 individuals after malicious actors gained access to the...
4 min read
North Korean-linked threat actors stole at least $2.02 billion in cryptocurrency during 2025, representing 76% of all service compromises and marking...
2 min read
Federal regulators say the company failed to protect information tied to millions of K through 12 students.
1 min read
Based on our research, MediaFire is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
2 min read
Cisco warns that a China-linked threat actor actively exploits a maximum-severity zero-day vulnerability in Cisco AsyncOS software, allowing...
2 min read
A phishing operation themed around an “Executive Award” notification is being used to deploy the Stealerium malware through a multi-stage loader...
1 min read
Based on our research, Zocdoc is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
3 min read
Fieldtex Products, Inc. has disclosed a data breach affecting approximately 250,000 individuals after discovering unauthorized access to its computer...
2 min read
European law enforcement agencies disrupted Cryptomixer, a cryptocurrency mixing service allegedly used by cybercriminals to launder over $1.5...
2 min read
Texas has dismissed its challenge to federal reproductive health privacy regulations following a related court decision that already blocked most of...
2 min read
The bureau says criminals are exploiting shopping and impersonation tactics to steal money and personal information.