Regular readers of Hot for Security will have read plenty of articles about cybercriminals who have created malware, or ...
In our complete ExpressVPN review, we get under the hood of one of the biggest names in VPN to see if it really lives up to the hype.
Phishing attacks in 2025 increasingly moved beyond email, with attackers using social platforms, search ads, and ...
A new phishing kit called Spiderman is being used to target customers of dozens of European banks and cryptocurrency holders ...
Researchers detail new AI and phishing kits that steal credentials, bypass MFA, and scale attacks across major services.
A recent study suggests people are more risk-avoidant when using their phones, so they tend to avoid clicking on links ...
Targeted email scams are getting bolder and more convincing. Here's how they work, and the smartest ways to defend yourself.
One particularly sneaky scam is a browser-in-the-browser (BitB) attack, in which threat actors create a fake browser window that looks like a trusted single sign-on (SSO) login page within a real ...
Some 2FA-phishing attacks are becoming significantly harder to spot as threat actors blend two previously distinct ...
North Korea’s Lazarus Group primarily employed spear phishing attacks to target companies in the cryptocurrency, finance, IT, and defense sectors, according to AhnLab.
Tiered multitenancy allows users to combine small and large tenants in a single collection and promote growing tenants to ...