The Latest in IT Security

1

Threat actors’ use of Cloudflare R2 to host phishing pages has witnessed a 61-fold increase over the past six months. “The majority of the phishing campaigns target Microsoft login credentials, although there are some pages targeting Adobe, Dropbox, and other cloud apps,” Netskope security researcher Jan Michael said. Cloudflare R2, analogous to Amazon Web Service […]

Read more ...

1

Phishing remains one of the top cyber threats faced by organizations, and as phishing scams become more sophisticated, security leaders need clearer insights into phishing risks across their industry and geography to prioritize defenses. A new report from KnowBe4 delivers valuable benchmarking data that reveals significant variances in phishing susceptibility. The 2023 Phishing Attack Landscape […]

Read more ...

1

Government-backed North Korean hackers are posting convincing U.S. military job recruitment documents to lure Korean-speaking victims into downloading malware staged from legitimate but compromised South Korean websites, according to security researchers. Due to the targets and type of attack, the cybersecurity firm Securonix dubbed this campaign STARK#MULE. They believe that APT37, a North Korean hacking […]

Read more ...


Categories

TUESDAY, JUNE 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments