OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure.
Microsoft partners with ASUS and Dell to expand Windows 365 Cloud PC hardware, launching new thin-client devices aimed at enterprises and regulated industries.
— Elizabeth Scallon, a longtime leader in Seattle’s startup ecosystem, has left HP after serving for nearly four years as… Read More ...
Microsoft has now joined the FIDO Alliance (Fast IDentity Online) which is actively trying to develop a new authentication ecosystem that can be used in place of passwords. There are various methods ...
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
Making sure your work stays private takes more than strong passwords. A few overlooked habits and settings can make a big difference in protecting your data.
Nearly 1 million accounts exposed in Figure data breach. Hackers used social engineering to steal names, emails and birth ...
We live in the golden age of technological enlightenment. By which I mean your vacuum cleaner now has a microphone, a camera, ...
Wiz threat research lead Amitai Cohen discusses how AI creates new attack surfaces, why 80% use default configs, and how attackers abuse AI CLIs on developer machines.
Zero-trust security means never trust, always verify. Here's what that means in practice, why it's replacing VPNs, and how organizations can actually implement it.
In 2026, the competitive edge isn't where your data sits, but how fast it moves. We compare how the top five platforms are ...