On December 4, 2025, researchers published details on the critical vulnerability CVE-2025-55182, which received…
Phishing
-
-
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them…
-
Telegram has won over users worldwide, and cybercriminals are no exception. While the average…
-
In September, a new breed of malware distributed via compromised Node Package Manager (npm)…
-
In the third quarter, attackers continued to exploit security flaws in WinRAR, while the…
-
While tracking the activities of the Tomiris threat actor, we identified new malicious operations…
-
Just like the 2000s Flip phones grew popular, Windows XP debuted on personal computers,…
-
The global e‑commerce market is accelerating faster than ever before, driven by expanding online…
-
Introduction Email remains the main means of business correspondence at organizations. It can be…
-
In 2022, we published our research examining how IT specialists look for work on…
