Catching a phish with many faces
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly...
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly...
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer....
Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam....
From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions...
ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks...
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity...