An unknown attacker claims to have hacked Pickett and Associates (Pickett USA), a Florida-based engineering firm, and is now selling a large amount of engineering data related to projects managed...
Before delving into the analysis, it is worth pointing out that this contribution is the first part of a more extensive research. In the next article, we will explore the...
Five days in London, and I felt like I was living inside a permanent demo of the future. The sleek, convenient, frictionless one. The one where you do everything with...
This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable...
MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For...
The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users'...
This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a new wave of activity attributed to the China-linked threat actor...
When we talk about cybercrime, we often think of something far away, something that doesn't concern us. But the truth is that cyberattacks can happen to anyone and have devastating...
No more useless alerts. No more passive monitoring. Less than two years after its launch, Google has decided to shut down one of the most talked-about digital security tools: the...
The psychology of passwords starts right here: trying to understand people before systems. Welcome to "The Mind Behind Passwords," the column that looks at cybersecurity. From a different perspective: that...