An alarming surge in sophisticated hacker activity is threatening the security of Microsoft accounts worldwide, with cybercriminals successfully bypassing even advanced defenses such as two-factor authentication. Security researchers at Proofpoint have unearthed an ingenious credential phishing...
In the rapidly evolving digital landscape, the emergence of "shadow AI"—the unsanctioned use of artificial intelligence tools within organizations—has become a pressing concern. This phenomenon poses significant risks, including data breaches, compliance violations, and operational...
ai analytics
ai governance
ai regulation
ai risks
ai security
ai solutions
ai tools
artificial intelligence
cybersecurity
digital security
employee training
it compliance
msp
operational security
organizational security
privacy
risk management
security audits
shadow ai
techthreats
A critical security vulnerability, identified as CVE-2025-47975, has been discovered in the Windows Simple Service Discovery Protocol (SSDP) service. This flaw, characterized by a double-free condition, allows authenticated local attackers to elevate their privileges on affected systems...
The rapid ascent of DeepSeek-R1, an advanced large language model (LLM), has not only captivated the AI community but also attracted the attention of cybercriminals. These malicious actors are exploiting the model's popularity to distribute sophisticated malware targeting Windows users. This...
Every time the cybersecurity community thinks they’re getting ahead of attackers, someone comes along and turns a trusted workflow into a digital bear trap. That’s exactly what’s unfolding in the latest campaign orchestrated by Russian threat actors who are gleefully exploiting legitimate...
One recent morning, Nick Johnson did what many of us do: scanned his inbox, eyes glazed, sifting spam from signal. Then he spotted what looked like a run-of-the-mill Google security alert—legit sender address, DKIM check passed, sorted neatly with his real security alerts. The message: Google...
A fake antivirus application is targeting Mac OS X computers using Apple's Safari browser. Cybercriminals pushing MAC Defender, named like the legitimate MacDefender antivirus product, are manipulating keywords to push malicious sites to the top of search results.
According to security...