Weekly roundup exploring how cyber threats, AI misuse, and digital deception are reshaping global security trends.
Australia is implementing new eSafety rules requiring search engines to blur pornographic and violent images to protect ...
Microsoft may be gearing up for one of the boldest engineering transformations the software industry has seen in decades. A ...
Cybercriminals have launched a widespread phishing campaign exploiting Microsoft's OAuth device code flow to bypass MFA and ...
Proofpoint has warned about phishing campaigns abusing legitimate device authorization flow to bypass MFA and gain persistent ...
Here are six predictions for how AI capabilities will evolve in 2026.
Artificial Intelligence, Cybersecurity, Vulnerability, Attacks, Machine Learning Share and Cite: Tsahat, C. and , N. (2026) ...
Hackers thought to be aligned with China and Russia are suspected to be behind a wave of account takeover attacks targeting Microsoft 365 users.
Financially motivated and nation-state threat groups are behind a surge in the use of device code phishing attacks that abuse Microsoft's legitimate OAuth 2.0 device authorization grant flow to trick ...
Microsoft is moving to disable RC4, an encryption cipher embedded in Windows authentication for more than two decades. The decision follows years of documented abuse, repeated warnings from security ...