Blog

Blog
Zero-Click iMessage Exploit Targets Key Officials in the US and EU

iVerify has identified a critical zero-click vulnerability in iMessage, referred to as “NICKNAME,” which has been exploited in targeted attacks…

Blog
Enhancing User Empowerment and Safeguarding Against GenAI Data Loss

With the widespread availability of generative AI tools in late 2022, employees in various sectors quickly recognized the potential of…

Blog
Microsoft Collaborates with CBI to Disrupt Indian Call Center Operation Involved in Japanese Tech Support Fraud

India’s Central Bureau of Investigation (CBI) has successfully dismantled two illegal call centers involved in a sophisticated transnational tech support…

Blog
Cybersecurity 2025: Six Critical Trends for CISOs to Monitor

This year’s Infosecurity Europe 2025 gathered industry experts to discuss the latest trends, challenges, and successes in the cybersecurity domain….

Blog
Understanding Adversarial Perspectives: The Growing Adoption of AEV Among Security Leaders

Cybersecurity requires a dual perspective, encompassing both defensive and offensive strategies. Security teams must delve into advanced technologies and explore…

Blog
Law Enforcement Apprehends 20 Individuals in Connection with Distribution of Child Sexual Abuse Material

Law enforcement agencies from more than a dozen countries have apprehended 20 individuals as part of a coordinated international effort…