News

Native phishing turns trusted tools into attack delivery systems. Varonis shows how attackers weaponize Microsoft 365 apps, ...
Abnormal AI, the leader in AI-native human behavior security, today announced its updated Security Posture Management product, bringing AI-driven protection, automated prioritization, and remediation ...
Cybercriminals are abusing the link wrapping security feature from Proofpoint and Intermedia to launch sophisticated phishing ...
"We are excited to be partnering with LawToolBox to bring more productivity and collaboration tools to our customer base, furthering ourmission to provide law firms with best in class technology ...
At Black Hat USA 2025, Zenity Labs revealed AgentFlayer, a comprehensive set of 0click exploit chains that allow attackers to silently compromise enterprise AI agents and assistants without requiring ...
Attackers could exploit widely deployed AI technologies for data theft and manipulation, experts from Zenity Labs found.
Regularly scan for any new AI services or features popping up in your SaaS environment, and evaluate any updates to vendors' ...
Over the past three months, our threat analysts have noticed a significant spike in attackers abusing Microsoft 365’s Direct Send feature—a tool intended for devices like printers or scanners to send ...
Managed IT and cybersecurity provider Flotek Group has launched a new Cloud Detection & Response (CDR) service — a proactive ...
GPT-5 had already been spotted in the wild before Altman’s appearance on This Past Weekend, fueling speculation that the next-generation GPT model was imminent. I understand OpenAI is planning to ...
Heather thought she was being cautious. When a helpful bank employee called to warn her of suspicious account activity, she ...