TTechnology Read More Microsoft 365 EvilToken campaign hits hundreds dailyApril 9, 2026 AppOmni’s threat hunting team has identified both attempted and successful EvilToken device code phishing activity across Microsoft 365…
TTechnology Read More Fake Windsurf extension uses Solana to steal dev dataMarch 19, 2026 Bitdefender researchers have identified a malicious extension that targeted the Windsurf integrated development environment (IDE) and used the…
TTechnology Read More AMD unveils Ryzen AI 400 chips for Copilot+ desktopsMarch 3, 2026 AMD has expanded its Ryzen AI PC line-up with new Ryzen AI 400 Series and Ryzen AI PRO…
TTechnology Read More Google warns of AI model theft & state-backed misuseFebruary 12, 2026 Google’s Threat Intelligence Group (GTIG) reports a rise in attempts to extract and replicate the logic of its…
AAustralia Read More Upcover adds deepfake cover to cyber insurance in AustraliaFebruary 5, 2026 Upcover has added a deepfake-focused endorsement to eligible cyber insurance policies on its platform through a partnership with…
TTechnology Read More Infostealers increasingly target enterprise SSO accessFebruary 4, 2026 Flare said infostealer malware is exposing enterprise identity credentials at a rising rate, with late-2025 data showing 16%…
TTechnology Read More Microsoft patches Windows zero-day & risky Office flawsDecember 10, 2025 Microsoft has released fixes for 54 security vulnerabilities in its latest monthly security update, including a Windows zero-day…
TTechnology Read More Attackers exploit ScreenConnect & Microsoft 365 for breachesDecember 4, 2025 Barracuda security researchers have identified an increase in the use of trusted tools such as ScreenConnect for unauthorised…
TTechnology Read More Gemini security flaws exposed millions to silent data breachesOctober 1, 2025 Tenable has identified three security vulnerabilities in Google’s Gemini suite that exposed millions of users to risks of…
TTechnology Read More Block ransomware proliferation and easily restore files with AI in Google DriveOctober 1, 2025 Ransomware remains one of the most damaging cyber threats facing organizations today. These attacks can lead to substantial…
TTechnology Read More Phishing campaign uses fake Microsoft apps to bypass MFAAugust 19, 2025 Proofpoint has identified a complex phishing campaign using counterfeit Microsoft OAuth applications to evade Multi-Factor Authentication (MFA) and…
TTechnology Read More Browser DevTools’ gaps leave millions exposed to threatsJuly 29, 2025 SquareX has highlighted architectural limitations in browser developer tools that hinder the effective debugging and analysis of potentially…