Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Glitch-hosted Phishing Uses Telegram & Fake CAPTCHAs to Target Navy Federal Credit Union Customers

From January to April 2025, Netskope Threat Labs tracked a three-fold increase in traffic to phishing pages created on the Glitch platform. These phishing campaigns have affected more than 830 organizations and over 3,000 users since January 2025, primarily targeting Navy Federal Credit Union members and seeking sensitive information.

French Users Targeted by Major Phishing Campaign

Researchers at IBM Security warn that a major phishing campaign is targeting users in France, incorporating leaked personal data to make the emails more convincing. IBM has observed seventeen waves of the campaign since March 2024, and at least 160,000 victims have clicked on the phishing link. “The phishing emails inform recipients that their Amazon Prime subscription will automatically renew at a cost of 480 Euros per year,” IBM explains.

Beyond Credentials: When Every Data Point Becomes a Weapon

You know what's interesting about data breaches? Everyone focuses on credit card numbers and financial data, but the reality is that every piece of information has value to someone. The Legal Aid breach perfectly illustrates this point, with over two million pieces of information accessed including details about domestic abuse victims, family cases, and criminal proceedings.

The Evolution of Phishing Attacks: Why Traditional Detection Methods Are Failing

If they weren't so harmful to both businesses and consumers, the sophistication of modern phishing would be quite impressive. Today's most invasive cybercriminals have moved beyond the old strategies of generic mass-email scams. They're now leveraging advanced technologies like Artificial Intelligence (AI,) deepfake media, and real-time behavioral analytics to craft highly personalized and nearly undetectable attacks.

Is Continuous Deployment Too Risky? Security Concerns and Mitigations

Adopting Continuous Deployment, an extreme form of software delivery automation, can drastically speed up software delivery, but it also introduces critical security challenges. Some of the most severe, global-scale security breaches of recent years (Solarwinds and Kaseya are just two examples) were related to breaches in software delivery infrastructure. Continuous deployment has the potential to make things worse.

What Is Cloud Security and How Can It Benefit Your Business?

Implementing cloud security policies and technologies has seen sustained growth in recent years. However, despite the widespread adoption of cloud-based solutions, many companies have yet to fully recognize the critical importance of cloud security or still find themselves wondering: what is cloud security and why should it matter to their business? Migrating to the cloud provides organizations with the agility to move faster and more efficiently.

IT Security Audits: Essential Insights and Best Practices

Today, when data breaches and cyberattacks are constant themes in the headlines, the protection and safety of digital assets have become a necessity, not an option. Businesses of all sizes invest time, money, and energy in IT environment protection; an IT security audit constitutes a critical pillar of a robust cybersecurity strategy.

Redis Backup Strategies: Essential Methods and Best Practices

Redis serves as a critical component for organizations managing high-performance data operations, with Redis Labs reporting substantial adoption across all industries. Proper Redis backup strategies remain fundamental for protecting business operations and preventing costly data loss. This guide offers practical methods for Redis backup and restore processes.

Discover and secure shadow IT with 1Password Extended Access Management

Shadow IT has been a concern of IT and security teams since SaaS became mainstream. However, as SaaS has become increasingly decentralized and employees are more and more tech-savvy, the security issues associated with shadow IT have only become more prevalent. Recent research backs this up. Needless to say, employees are signing up for software and services outside of IT’s purview.