Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft is Still the Most Commonly Impersonated Brand in Phishing Attacks

Microsoft, Apple, and Google were the most commonly impersonated brands in phishing attacks last quarter, according to researchers at Check Point. “Microsoft retained its dominance as the most imitated brand in phishing schemes, accounting for a staggering 32% of all attempts,” Check Point says. “Apple followed with 12%, while Google ranked third. Notably, LinkedIn reentered the list at fourth place, emphasizing the persistent targeting of technology and Social Network brands.

Using Genuine Business Domains and Legitimate Services to Harvest Credentials

A KnowBe4 Threat Lab Publication Authors: Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer Executive Summary The KnowBe4 Threat Lab analyzed a sophisticated phishing campaign targeting multiple organizations to harvest Microsoft credentials. Threat actors utilized a compromised domain, its subdomains, bulk email services, and open redirect vulnerability to evade detection and increase click success rates.

Why you need to secure your digital supply chain in 2025

Digital supply chain attacks are happening more often, inflicting widespread damage and threatening your future operations. Here’s one simple solution. How would you know if your digital supply chain is under attack? From aerospace and defense projects to engineering and infrastructure programs, modern manufacturing processes rely on digital supply chains. These interconnected cloud highways streamline production workflows and improve efficiency across the supply chain.

CrowdStrike Extends Powerful Falcon Platform Capabilities into Red Hat OpenShift

Kubernetes has become the cornerstone of modern DevOps, empowering teams to quickly deploy, manage, and scale containerized applications. However, many struggle to navigate Kubernetes' complexity while operating across hybrid and multi-cloud environments. Red Hat OpenShift builds on Kubernetes by providing a consistent, enterprise-grade platform that abstracts the intricacies of the underlying infrastructure. It’s trusted by customers across industries and around the globe.

Cloudflare meets new Global Cross-Border Privacy (CBPR) standards

Cloudflare proudly leads the way with our approach to data privacy and the protection of personal information, and we’ve been an ardent supporter of the need for the free flow of data across jurisdictional borders. So today, on Data Privacy Day (also known internationally as Data Protection Day), we’re happy to announce that we’re adding our fourth and fifth privacy validations, and this time, they are global firsts!

Introducing GitGuardian Secrets Detection Integration For ServiceNow

GitGuardian can now scan for secrets throughout all your ServiceNow tables and records. GitGuardian now integrates natively with ServiceNow to help your team find and eliminate more than 450 types of secrets that might have been leaked into your instance of the popular process automation platform.

Random but Memorable - Episode 14.1: Breakfast Cereal Hacking Culture with Emily Crose

We’re back! Join us for a brand new season, as we welcome special guest, Emily Crose, to discuss her new book: Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers. Tune in as we deep-dive into the history of hacker culture and its transformation into a geopolitical force.