
A security incident of staggering proportions came to light in January 2026, revealing that a publicly accessible dataset contained the usernames and passwords for an estimated 48 million Gmail accounts. This massive collection of credentials was part of an even larger dump totaling 149 million
As organizations accelerate their digital transformation initiatives, the proliferation of web applications—from vital customer-facing portals to critical internal management systems—has dramatically expanded the digital attack surface, making them a primary target for increasingly sophisticated
As the world turns its attention to the spectacle of the Milano-Cortina Winter Games, a less visible but equally intense competition is unfolding in the digital realm, where cybercriminals are preparing to exploit the event's vast interconnected infrastructure. A recent assessment of the cyber
Today, we’re sitting down with Rupert Marais, our in-house security specialist, to dissect a sophisticated multi-stage phishing campaign recently targeting Russia. This attack is a masterclass in modern evasion techniques, blending social engineering with the abuse of legitimate public cloud
A meticulously orchestrated phishing campaign promising quick financial relief is systematically dismantling the digital security of bank customers across Latin America, turning the hope for a loan into a nightmare of stolen credentials. This operation, first identified in Peru, has rapidly evolved
Today, we're joined by Rupert Marais, our in-house Security Specialist, to dissect a concerning trend of automated attacks targeting Fortinet FortiGate devices. With his deep expertise in endpoint security and network management, Rupert will shed light on a new cluster of malicious activity that
An inbox flooded with urgent, official-looking emails from brands you trust, each bypassing sophisticated security filters, signals a concerning shift in the cybersecurity landscape where the very tools built for communication are being weaponized. The latest wave of highly effective spam campaigns
As a security specialist with deep expertise in endpoint security and cyber strategy, Rupert Marais has a unique vantage point on the evolving landscape of digital threats. We sat down with him to dissect a recent, sophisticated supply chain attack that shifts the focus from individual developers
The digital keys to our professional lives, once considered just one piece of a complex security puzzle, have now become the master key sought by cybercriminals above all else. A fundamental transformation in the cyber threat landscape has occurred, shifting the primary battleground from corporate
The mundane frustration of a crashing web browser might be more than just a technical glitch; for thousands of users, it has become the gateway to a sophisticated cyberattack designed to seize control of their systems. A malicious Google Chrome extension, downloaded over 5,000 times from the
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62
ITCurated uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy