phishing

phishing news search results

Developer news items we found relating to phishing

35 results
OpenShift-4.21-launches-with-unified-platform-for-AI-and-modern-apps

OpenShift 4.21 launches with unified platform for AI and modern apps


Wednesday, February 11, 2026 by

Red Hat OpenShift 4.21 is now generally available, based on Kubernetes 1.34 and CRI-O 1.34. This release focuses on unifying AI training, containerized microservices, and virtualized applications on a single operational model to reduce costs and eliminate infrastructure silos. Accelerated AI innovation Streamlined training: Data scientists can use a sing...


AI-generated-scams-and-phishing-in-2026

AI generated scams and phishing in 2026


Monday, January 5, 2026 by

David Stonehill, CTO, NetLib Security offers his insight into what 2026 will hold for us in the way of AI scams. By 2026, AI-generated scams and phishing will be virtually indistinguishable from legitimate apps, storefronts, and communications making detection alone unreliable. App developers will need to design for breach resilience using MFA, passkeys, AI-driven se...


Airline-data-breach-hits-WestJet-exposing-over-1M-passengers

Airline data breach hits WestJet exposing over 1M passengers


Thursday, October 30, 2025 by

Canada’s second-largest airline, WestJet, disclosed that a data breach earlier this year compromised the personal information of approximately 1.2 million passengers. The airline reported the incident in a filing with Maine’s attorney general, confirming that 240 residents in the state were affected. Details of the information compromised The informati...


Relic-research-shows-high-impact-IT-outages-carry-$76M-median-year

Relic research shows high impact IT outages carry $76M median year


Thursday, October 23, 2025 by

New Relic released its 2025 Observability Forecast, the industry’s most comprehensive report on the state of observability. Surveying over 1,700 IT and engineering leaders and team members across 23 countries and 11 industries, the report highlights key focus areas, challenges, and trends influencing observability investments like the growing adoption of enterpris...


Phishing-sites-seized-by-Microsoft-in-major-crackdown

Phishing sites seized by Microsoft in major crackdown


Tuesday, September 23, 2025 by

Microsoft has intensified its efforts to combat cybercrime by targeting Raccoon0365, a subscription-based phishing service that enabled wide-scale credential theft. Working through the U.S. District Court in Manhattan, the company successfully obtained approval to seize nearly 340 internet domains associated with fraudulent login pages. The campaign represents one of...


Salesforce-breach-let-hackers-steal-Google-customer-data

Salesforce breach let hackers steal Google customer data


Monday, August 25, 2025 by

In June, one of Google’s corporate Salesforce instances was affected by activity consistent with the UNC6040 campaign described in the post. Google responded by conducting an impact analysis and implementing mitigation steps. The affected instance stored contact information and related notes for small and medium-sized businesses. Investigators confirmed that data ...


Microsoft-at-Black-Hat-USA-2025

Microsoft at Black Hat USA 2025


Monday, August 11, 2025 by

Microsoft will participate in Black Hat USA 2025, scheduled for August 5-7 in Las Vegas, offering attendees a practitioner-driven experience centered on real-world threat intelligence, incident response, and applied AI expertise. The company emphasizes that cybersecurity is most effective when intelligence, tools, and domain expertise are tightly integrated. To that end...


KNP-ransomware-attack

KNP ransomware attack


Wednesday, August 6, 2025 by

One of the UK's oldest transport companies, KNP Logistics Group, collapsed under the weight of a ransomware attack that began with a single guessed password. The company, founded in 1865 and known primarily through its “Knights of Old” fleet, had survived world wars, economic upheavals, and generational shifts in the freight industry. But it could not su...


McDonalds-AI-Hiring-Bot-Breach

McDonalds AI Hiring Bot Breach


Thursday, July 17, 2025 by

Security researchers uncovered a critical vulnerability in McDonald’s AI-powered hiring system, McHire, revealing how a simple password flaw could have exposed applicant data, but importantly, no candidate information was leaked or made publicly available, and only five records were briefly accessed by researchers who responsibly reported the issue. In a supers...


AI-harms-addressed-by-Anthropic

AI harms addressed by Anthropic


Wednesday, May 21, 2025 by

As AI capabilities rapidly advance, understanding and addressing the full spectrum of potential impacts becomes increasingly important. Today, we're sharing insights into our evolving approach to assessing and mitigating various harms that could result from our systems, ranging from catastrophic scenarios like biological threats to critical concerns like child safet...


Security-trade-offs-and-Xs-vulnerabilities

Security trade-offs and Xs vulnerabilities


Friday, March 21, 2025 by

The latest cyberattack on X raises an important question: Was this an external attack or a result of internal instability? While hacktivist group Dark Storm has claimed responsibility for the distributed denial-of-service (DDoS) attack, it is just as crucial to examine X’s own security posture, particularly in light of the drastic staffing cuts that followed Elon ...


Cybersecurity-in-2025

Cybersecurity in 2025


Tuesday, February 4, 2025 by

Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...


NetLib-Security-predictions-2025

NetLib Security predictions 2025


Thursday, January 2, 2025 by

The leading prediction for 2025 will sound familiar: Generative AI directly affects your privacy rights. In many ways, this is a twist on the typical cybersecurity problem. Rather than a hacker or a bad actor breaking in to steal your data, we are being asked to hand our keys to the companies we often trust the most: Microsoft, Apple, Dropbox, and Google! NetLib Secu...


PhishFlagger-anti-phishing-email-solution-released

PhishFlagger anti-phishing email solution released


Monday, August 19, 2024 by

PhishFlagger, a human-compatible patented phishing solution, recently announced its new patented anti-phishing email solution. The solution validates emails through a unique identifier protocol, PhishCounter, which adds a sequential number in the subject line that identifies all outgoing and inbound emails. The easily implemented system also allows recipients to identif...


Tom-Brady-NFT-sale-sparks-warning-to-consumers-from-experts

Tom Brady NFT sale sparks warning to consumers from experts


Wednesday, February 28, 2024 by

An expert has warned those considering purchasing an NFT off the back of the Tom Brady $40.7k sale, as NFT marketplaces saw $38 million stolen by scammers last year. The findings, pulled together by Smart Betting Guide, analyzed a database recording crypto scams and exploits to identify the most vulnerable platforms and blockchains over the last year - with NFT marke...


AI-cybersecurity-impacts-according-to-NetLib-Security

AI cybersecurity impacts according to NetLib Security


Monday, December 18, 2023 by

This is an easy call to make: NetLib Security predicts that Artificial Intelligence - Generative AI - will continue to heavily impact the world of cybersecurity, upping the game for defensive players, while giving cybercriminals more tools on the offensive side. 2023 was a year in which AI seemed suddenly to be everywhere. Although AI is not a new field, ChatGPT and ...


ImmuniWeb-Neuron-web-security-scanning

ImmuniWeb Neuron web security scanning


Friday, June 10, 2022 by

ImmuniWeb has announced the launch of ImmuniWeb Neuron, a web application and API web security scanning solution that is based on the award-winning ImmuniWeb AI Platform available. ImmuniWeb Neuron is designed to rapidly scan tens, hundreds, or even thousands of web applications and APIs for vulnerabilities, weaknesses, and misconfigurations. It c...


Protecting-source-code

Protecting source code


Wednesday, October 6, 2021 by

Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...


Cyvatar-raises-9-million-for-cybersecurity-as-a-service-model

Cyvatar raises 9 million for cybersecurity as a service model


Monday, June 21, 2021 by

Cyvatar announced that it has raised $9 million as part of its Series A financing to help scale and serve its rapidly growing customer base and continue to drive the adoption of its innovative cybersecurity-as-a-service (CSaaS) model. Cyvatar raises 9 million for cybersecurity as a service model Escalating cybersecurity breaches and the need to addr...


How-to-avoid-mobile-phone-apps-from-leaking-your-personal-data

How to avoid mobile phone apps from leaking your personal data


Wednesday, November 18, 2020 by

Most people have dozens of mobile phone apps installed on their phone, tablet, or even their smartwatch. In fact, the average person has about 60 to 90 mobile phone apps on their phone. Out of all those apps, many of them could be leaking your personal data. How can you protect yourself? One of the primary ways is by installing a VPN, but there are other ways, too. Here...


Match.com-gets-sued-by-FTC-for-using-fake-love-interest-ads

Match.com gets sued by FTC for using fake love interest ads


Thursday, September 26, 2019 by

This just in from the FTC. The Federal Trade Commission has sued online dating service Match Group, Inc. (Match), the owner of Match.com, Tinder, OkCupid, PlentyOfFish, and other dating sites, alleging that the company used fake love interest advertisements to trick hundreds of thousands of consumers into purchasing paid subscriptions on Match.com. The agency also al...


A-world-with-no-passwords-and-how-FIDO2-can-help-make-it-happen

A world with no passwords and how FIDO2 can help make it happen


Monday, May 13, 2019 by

93.2 percent of the overall web browser market has embraced FIDO2: Google Chrome, Microsoft Edge, Apple Safari, Mozilla Firefox, and Opera. The FIDO Alliance is driven by hundreds of global tech leaders across enterprise, payments, telecom, government, and healthcare that have come together in support of the organization’s mission to reduce the world’s re...


Finding-website-risk-levels-and-reputations-gets-easier-for-IT-admins

Finding website risk levels and reputations gets easier for IT admins


Monday, May 13, 2019 by

NetMotion Software announced NetMotion Reputation, a subscription service that identifies the risk profile and usage categories of hundreds of millions of web domains. Reputation allows IT teams to get visibility into user behavior, including a better understanding of access to risky or inappropriate cloud applications and websites. Customers can also block access if an...


Videoselfie-authentication-tool-launches

Videoselfie authentication tool launches


Tuesday, February 19, 2019 by

Jumio announced the launch of Jumio Authentication, a new video-selfie authentication that uses biometrics for user authentication, that could be ideal for account logins and high-risk scenarios (e.g., logging in from a foreign IP address or authorizing high-risk transactions such as wire transfers and online purchases). Secure selfie authentication can also be use...


Enterprise-security-report-says-mobile-workers-put-data-at-risk

Enterprise security report says mobile workers put data at risk


Wednesday, October 10, 2018 by

According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...


30,000-blacklisted-apps-hosted-on-the-Google-Play-Store-report-finds

30,000 blacklisted apps hosted on the Google Play Store report finds


Friday, September 21, 2018 by

RiskIQ has released its Mobile Threat Landscape Q2 2018 Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings show a spike in blacklisted apps headlined by Trojans and Adware, as well as a fascinating shift in tactics by mobile threat actors. For the second year in a row, RiskIQ observed a sharp increase in black...


Fortnite-for-Android-is-a-trailblazing-risk-for-mobile-banking

Fortnite for Android is a trailblazing risk for mobile banking


Tuesday, August 14, 2018 by

CEO Tim Sweeny of Epic Games, the publisher of the wildly popular Fortnite game, is on a mission to “advance the openness of all platforms” - not to mention side-step Google’s 30% take of developer proceeds - by distributing Fortnite for the Android platform via their website rather than the Google Play store. I applaud a maverick challenging the statu...


ICO-investment-guide-to-review-before-you-leap

ICO investment guide to review before you leap


Wednesday, February 21, 2018 by

When reviewing a new cryptocurrency project or vendor, there is a certain amount of due diligence required. The crypto space is notorious for an abundance of charlatans, phishers and scammers which seem to only get more sophisticated and verisimilar by the day. Here is a quick checklist to run through when approaching or being approached by a party or project in crypto....


Using-common-short-codes-for-mobile-app-marketing

Using common short codes for mobile app marketing


Friday, February 16, 2018 by

App developers know well the difficulties in marketing their apps. But a highly compelling way to advertise their apps in the context to the real world is being overlooked.Common Short Codes provide an easy way for app developers and brands to get consumers to download an app in context with their current, real-world surroundings. Common Short Codes bring integrity and ...


SlashNext-launches-AI-internet-threat-protection-system-

SlashNext launches AI internet threat protection system


Thursday, November 9, 2017 by

SlashNext announced the company’s broad market release of the SlashNext Internet Access Protection System to protect organizations from cross platform social engineering and phishing, malware, exploits and callback attacks. The system goes beyond first generation signature-based and second generation sandbox-based technologies and deploys artificial intelligence and cog...


New-biometric-authentication-could-be-a-password-killer

New biometric authentication could be a password killer


Wednesday, July 12, 2017 by

Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...


Enterprise-threat-dubbed-HospitalGown-infests-thousands-of-apps

Enterprise threat dubbed HospitalGown infests thousands of apps


Tuesday, June 6, 2017 by

Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...


Ways-you-can-protect-yourself-on-the-Internet

Ways you can protect yourself on the Internet


Thursday, February 23, 2017 by

Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


Bitdefender-releases-IoT-security-device-at-CES-2017

Bitdefender releases IoT security device at CES 2017


Saturday, January 7, 2017 by

Bitdefender BOX helps with smart device hacking that threatens our new way of being connected with IoT.Bitdefender, a cybersecurity solutions provider, unveils at CES in Las Vegas the next-generation of Bitdefender BOX, the device turning the table on cyber-criminals and revolutionizing the way people protect themselves from malware, hackers, ransomware, phishing and ot...


Featured Stories


APAC 5G expansion to fuel 347B mobile market by 2030
APAC 5G expansion to fuel 347B mobile market by 2030 Tuesday, April 21, 2026


Jentic launch gives AI agents api access
Jentic launch gives AI agents api access Wednesday, April 15, 2026


Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines
Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines Tuesday, April 14, 2026




Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance
Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance Tuesday, April 14, 2026


IT spending rises as banks balance legacy and innovation
IT spending rises as banks balance legacy and innovation Monday, April 13, 2026


FCC prohibits new foreign router models citing critical infrastructure risks
FCC prohibits new foreign router models citing critical infrastructure risks Thursday, April 9, 2026


Enviromates tech startup launches global participation platform
Enviromates tech startup launches global participation platform Friday, March 27, 2026


Private Repository Secures the AI-driven Development Boom
Private Repository Secures the AI-driven Development Boom Friday, March 27, 2026


UK Fintech Platform Enviromates Connects Projects Brands and Consumers
UK Fintech Platform Enviromates Connects Projects Brands and Consumers Thursday, March 26, 2026


How Industrial AI Is Transforming Operations in 2026
How Industrial AI Is Transforming Operations in 2026 Wednesday, March 25, 2026


Stay Updated

Sign up for our newsletter for the headlines delivered to you

SuccessFull SignUp

Get More App News



/sites/themes/prod/assets/js/less.js"> ' ' %>