Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protect Yourself: Vishing Attacks Are Growing More Sophisticated

Researchers at Google’s Mandiant have published a report on voice phishing (vishing) attacks, noting that these attacks have served as initial access points for recent waves of ransomware incidents. Threat actors often perform reconnaissance before launching social engineering attacks, collecting publicly available information in order to craft tailored, realistic scenarios.

How Browser-Level Signals Help Prevent Credential Stuffing Attacks

Credential stuffing attacks are one of the most persistent and damaging account-based threats facing security teams – and one of the hardest to detect. In 2024, Akamai, a global leader in content delivery and cybersecurity, reported more than 26 billion credential stuffing attempts globally every month – a staggering volume that’s not slowing down. Most enterprises rely on server-side, post-login detection, which captures only successful login attempts.

A Guide to Staying Cyber-Safe While Learning Online

Online education has grown to be a significant aspect of college life. The internet serves as your classroom, whether you're using Zoom for lectures, Google Classroom for assignments, or Microsoft Teams for group projects. The problem is that as people spend more time online, the likelihood of cyberattacks is increasing. So, how can you learn online without being hurt? Without requiring a degree in computer science, let's explore a comprehensive guide that can help you safeguard your digital identity, gadgets, and personal information.

What To Know About the UNFI Cyber Attack

On June 9, 2025, United Natural Foods, Inc. (UNFI) – a major organic food distributor and the main grocery supplier for Whole Foods Market – reported a cyber attack. UNFI first discovered unauthorized activity in its IT systems on June 5 and immediately took some systems offline. At the time of this writing, the investigation is ongoing as officials assess the full impact of the breach.

OpenAI Report Describes AI-Assisted Social Engineering Attacks

OpenAI has published a report looking at AI-enabled malicious activity, noting that threat actors are increasingly using AI tools to assist in social engineering attacks and influence operations. In one case, the company banned ChatGPT accounts that were likely being used in North Korean attempts to fraudulently obtain jobs at US companies. “Similar to the threat actors we disrupted and wrote about in February, the latest campaigns attempted to use AI at each step of the employment process.

Stealth Cyberattacks at Night: How Librarian Ghouls Are Exploiting Trusted Tools to Evade Detection

The cyber threat landscape is rapidly evolving. Among the most recent and concerning trends is the use of stealth attacks that bypass traditional defenses by abusing legitimate tools. One such campaign, led by a group called Librarian Ghouls, is targeting organizations across Russia with cleverly disguised phishing emails, cryptominers, and remote-access software—often operating undetected in the middle of the night.