Large Scale Okta Phishing Campaign Targets Many Organizations
According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no…
According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no…
Do you make use of the “MyChart” portal to refill prescriptions, contact your healthcare providers or make appointments? If so, you…
Using different passwords on every website and storing them in a secure password manager is a standard best practice in data…
Do you have the Kali Linux distribution running on one of the machines you own? If you’re not sure what that…
MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the…
If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to…
Does your company use Microsoft 365? If so, and you’ve noticed that your Office apps have begun to crash mysteriously and…
The Internet of Things (IoT) has seen explosive growth in recent years. If you like, you can now build your own…
Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed…
“Just Google it.” You’ve probably heard that phrase a thousand times. In fact, you may use it yourself on a regular…