The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited over a 10-month span in hacking campaigns conducted by ...
CISA ordered U.S. federal agencies to patch three iOS security flaws targeted in cyberespionage and crypto-theft attacks using the Coruna exploit kit.
Tycoon2FA has become a leading phishing-as-a-service (PhaaS) platforms, enabling campaigns that reach over 500,000 organizations monthly, prompting Microsoft’s Digital Crimes Unit (DCU) to work with ...
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
Google uncovered Coruna iOS exploit kit with 23 exploits across five chains targeting iPhones running iOS 13–17.2.1.
An international law enforcement operation coordinated by Europol has disrupted Tycoon2FA, a major phishing-as-a-service ...
Probably not an isolated incident only as researchers have already found 2,863 live API keys exposed A developer says their ...
AI browsing agent left local files open for the taking If you wanted to steal local files from someone using Perplexity's ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Scams that use text, email and direct-messaging services are not new, but AI is changing how they work. Historically, ...
Most SEO work means tab-switching between GSC, GA4, Ads, and AI tools. What if one setup could cross-reference them all?
There are several great authenticator solutions, including these five.