Are you trying to sign into Microsoft Office?
It has certainly been very encouraging to see stronger multi-factor authentication gain ...
Community Disservice Part Two: Mitigating Modern Human-Centric Intrusions
In our previous analysis of "The Com" ecosystem, we explored how these threat actors ...
Community Disservice Part One: Analysing Modern Human-Centric Intrusions
The cybercrime subculture referred to as "The Com" emerged around 2018 as a loose ...
Recent AI Threats: From Theory to Reality
As we discussed in our previous post in the AI and Security series, our industry is not ...
I Am Not A Robot
Since my last blog post on the subject, ClickFix-style social engineering techniques have ...
A Cheater's Dilemma
As part of our 2024 Cyber Smart Week blog series, our security team share their thoughts ...
Converging paths - Analysis of recent Lumma Stealer campaigns
As part of our 2024 Cyber Smart Week blog series, our security team share their thoughts ...
The Phish that won't die
After yesterday’s post that opened our 2024 Cyber Smart Week series, it only seems ...
Evasion Trends in Phishing Campaigns
Adapting to a changing environment is precisely what we have seen cybercriminals do as ...