مقالات

مقالات
Microsoft 365 Implements Default Restrictions on File Access Through Legacy Authentication Protocols

Microsoft has announced updates to security defaults for all Microsoft 365 tenants, set to take effect in July 2025, which…

مقالات
AI Now Constitutes the Predominant Source of Spam and Malicious Emails

Over half (51%) of malicious and spam emails are now generated using AI tools, according to a study conducted by…

مقالات
Fraudulent Bank Advertisements on Instagram Expose Victims to Financial Scams

Fraudulent advertisements on Instagram, including deepfake videos, are impersonating reputable financial institutions such as Bank of Montreal (BMO) and EQ…

مقالات
Over 1,500 Minecraft Players Targeted by Java Malware Disguised as Game Modifications on GitHub

A new multi-stage malware campaign is targeting Minecraft users through a Java-based malware utilizing a distribution-as-service (DaaS) model known as…

مقالات
WormGPT Re-emerges Through Enhanced Grok and Mixtral Model Utilization

Cato CTRL has identified emerging WormGPT variants circulating on Telegram, which are powered by unauthorized adaptations of advanced language models,…

مقالات
Department of Justice Data Security Program: Essential Compliance Considerations for Affected Entities

On April 11, 2025, the Department of Justice’s National Security Division (NSD) released a Compliance Guide, an Implementation and Enforcement…