Identity & Access Management

eScan Antivirus Breach Delivers Signed Malware via Updates
Identity & Access Management eScan Antivirus Breach Delivers Signed Malware via Updates

The very tools designed to protect digital environments have become the conduits for a sophisticated cyberattack, turning a trusted antivirus solution into an unwitting distributor of malware that evades conventional security checks. A recent investigation has uncovered a critical supply chain

Data Leak Exposes 48 Million Gmail Passwords
Identity & Access Management Data Leak Exposes 48 Million Gmail Passwords

A security incident of staggering proportions came to light in January 2026, revealing that a publicly accessible dataset contained the usernames and passwords for an estimated 48 million Gmail accounts. This massive collection of credentials was part of an even larger dump totaling 149 million

Fake Loan Scam Steals Bank PINs Across Latin America
Identity & Access Management Fake Loan Scam Steals Bank PINs Across Latin America

A meticulously orchestrated phishing campaign promising quick financial relief is systematically dismantling the digital security of bank customers across Latin America, turning the hope for a loan into a nightmare of stolen credentials. This operation, first identified in Peru, has rapidly evolved

Are Training Apps a Backdoor to Your Cloud?
Identity & Access Management Are Training Apps a Backdoor to Your Cloud?

The very tools designed to teach cybersecurity best practices are now serving as an unlocked side door for malicious actors to infiltrate the cloud environments of the world's largest companies. A recently published investigation has uncovered a deeply ironic and widespread security flaw in which

How Secure Is Your LastPass Password Vault?
Identity & Access Management How Secure Is Your LastPass Password Vault?

The digital keys to an entire life—from banking portals to private correspondence—are often consolidated into a single, trusted password vault, a convenience that can become a catastrophic single point of failure with one well-crafted email. A recent, highly sophisticated phishing campaign

AI Security Posture Management – Review
Identity & Access Management AI Security Posture Management – Review

The rapid integration of artificial intelligence into core business functions has inadvertently created a pervasive and dynamic attack surface that fundamentally bypasses the safeguards of conventional cybersecurity frameworks. As organizations embrace AI to fuel innovation and gain a competitive

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later