How to Automate Phishing Detection to Prevent Data Theft

How to Automate Phishing Detection to Prevent Data Theft

Phishing is no longer about badly written emails asking you to “click here.” Today’s attacks are business-grade, powered by AI and packaged in ready-to-use phishing kits. That means cybercriminals can now launch believable spearphishing campaigns in hours. For companies, this raises the stakes. A single successful phishing email can expose confidential data, disrupt operations, and…

Read More
Identity theft hits 1.1M reports — and authentication fatigue is only getting worse

Identity theft hits 1.1M reports — and authentication fatigue is only getting worse

Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more From passwords to passkeys to a veritable alphabet soup of other options — second-factor authentication (2FA)/one-time passwords (OTP), multi-factor authentication (MFA), single sign-on (SSO), silent network authentication (SNA) — when it comes…

Read More
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called OtterCookie with capabilities to steal credentials from web browsers and other files. NTT Security Holdings, which detailed the new findings, said the attackers have “actively and continuously” updated the malware, introducing versions v3 and…

Read More
16 Chrome Extensions Hacked in Large-Scale Credential Theft Scheme

16 Chrome Extensions Hacked in Large-Scale Credential Theft Scheme

SUMMARY Large-Scale Breach: Over 16 Chrome extensions were compromised, exposing 600,000+ users to data and credential theft. Phishing Attack: Developers were tricked into granting access to a malicious OAuth app via fake Chrome Web Store emails. Cyberhaven Impact: Attackers used admin credentials to deploy a malicious update stealing sensitive user data. Widespread Impact: Many extensions…

Read More