Blog

Blog
Scattered Spider Leverages Technology Vendor Impersonation to Target Help Desks

Scattered Spider, a ransomware collective implicated in recent retail cyberattacks in the UK, has refined its strategy by implementing more…

Blog
Exploitation of Booking.com Reservations: Cybercriminals Targeting Travelers’ Finances

Robert Woodford, a recruitment marketing specialist, recently experienced a sophisticated scam while booking a hotel in Verona through Booking.com. This…

Blog
Exploitation of Critical Fortinet Vulnerabilities in Qilin Ransomware Campaigns

The Qilin ransomware operation has recently been identified as targeting two critical Fortinet vulnerabilities, enabling threat actors to bypass authentication…

Blog
Zero-Click iMessage Exploit Targets Key Officials in the US and EU

iVerify has identified a critical zero-click vulnerability in iMessage, referred to as “NICKNAME,” which has been exploited in targeted attacks…

Blog
Enhancing User Empowerment and Safeguarding Against GenAI Data Loss

With the widespread availability of generative AI tools in late 2022, employees in various sectors quickly recognized the potential of…

Blog
Microsoft Collaborates with CBI to Disrupt Indian Call Center Operation Involved in Japanese Tech Support Fraud

India’s Central Bureau of Investigation (CBI) has successfully dismantled two illegal call centers involved in a sophisticated transnational tech support…