The ShinyHunters group uses sophisticated voice phishing (vishing) to steal employee credentials and bypass multi-factor authentication by impersonating IT support…
Read More »SharePoint
Entity category: Technology
A sophisticated phishing campaign is targeting the energy sector using Adversary-in-the-Middle (AiTM) attacks, which bypass standard email filters and multi-factor…
Read More »Cyber threats are evolving faster than defenses, with attackers constantly refining their tactics, techniques, and procedures (TTPs), creating a widening…
Read More »BigID's Activity Explorer addresses fragmented security visibility by centralizing audit logs from diverse cloud and on-premises systems into a single,…
Read More »The Tycoon 2FA phishing kit enables attackers to easily bypass multi-factor authentication by using automated tools and fake login portals,…
Read More »Businesses are adopting a cautious approach to generative AI, moving beyond initial excitement to demand tangible results and proof of…
Read More »OpenAI has surpassed one million business customers and seven million ChatGPT for Work seats, reflecting rapid enterprise adoption and a…
Read More »The rise of shadow DAMs—informal systems for managing digital assets outside official governance—offers immediate collaboration benefits but introduces risks like…
Read More »The University of Pennsylvania experienced a cybersecurity breach where hackers used stolen credentials via social engineering to access systems, stealing…
Read More »A data breach at the University of Pennsylvania exposed personal information of about 1.2 million donors, students, and alumni, compromising…
Read More »Active Directory is critical for enterprise identity management, and rushing recovery after a ransomware attack can worsen damage by reintroducing…
Read More »OpenAI has launched a "company knowledge" feature for ChatGPT, enabling Business, Enterprise, and Education users to integrate with platforms like…
Read More »The "Jingle Thief" cyber campaign targets retailers by exploiting cloud environments using stolen credentials from phishing, bypassing traditional malware and…
Read More »Anthropic's Claude AI is now integrated into Microsoft 365, providing an alternative to Microsoft Copilot and enabling interaction within apps…
Read More »AI-powered browsers introduce significant security vulnerabilities by embedding AI assistants that enable novel threats like malicious workflows and prompt injections,…
Read More »OpenAI has introduced a suite of updates for ChatGPT, including a shared projects mode and new third-party app connectors, to…
Read More »Microsoft 365's widespread adoption and integration of services like Outlook and Teams make it a prime target for cyberattacks, offering…
Read More »Sentra has introduced a specialized security solution to protect sensitive enterprise data within Microsoft 365 Copilot environments, ensuring compliance and…
Read More »Microsoft Teams has introduced AI-powered agents, including facilitator, channel, community, and knowledge agents, to enhance collaboration across meetings, channels, and…
Read More »Microsoft and Cloudflare dismantled the RaccoonO365 phishing-as-a-service scheme, which harvested thousands of Microsoft 365 credentials through deceptive campaigns. The operation…
Read More »


















