
Downgrade Attacks: When Even Strong Authentication Can Be Tricked
FIDO-based passkeys (like hardware keys, biometrics, or “passwordless” logins) are considered one of the best ways to protect accounts from phishing and takeover threats. They’re strong because they don’t rely on passwords or codes that can be easily stolen. But researchers at Proofpoint have found a new trick called a “downgrade attack.” Here’s how it […]

Simplicity Wins
The Criticality of Reducing Complexity in Cybersecurity For decades, the cybersecurity industry has been building increasingly sophisticated security architectures in an effort to keep up with the burgeoning business of cybercrime. The problem is … Well, it’s complicated! The complexity — of our approach AND our solutions — is arguably the biggest issue in Cyber […]

ShinyHunters & Scattered Spider: A Dangerous New Alliance in Cybercrime
Recent cyberattacks targeting global brands like Google, Louis Vuitton, and Allianz suggest a troubling trend – two notorious hacking groups, ShinyHunters and Scattered Spider, may be working together. According to threat researchers at ReliaQuest, patterns in attack timing, shared infrastructure, and overlapping targets point to an unprecedented collaboration between these groups, each with very different […]

Scattered Spider Cyberattacks Expose the Fatal Flaw in Legacy Login — And How to Fix It
In recent months, the notorious Scattered Spider cyberattacks have made headlines with high-profile breaches targeting major organizations. These attacks are not only sophisticated, but also a stark reminder of a dangerous truth: any login system that relies on shareable secrets is fundamentally vulnerable. What Is Scattered Spider and How Do They Attack? The Scattered Spider […]

2FA is Not MFA: The Distinction Matters More than Ever
In the world of cybersecurity, experts talk a lot about Multi-Factor Authentication (MFA) as the #1 basic requirement for all Enterprises. Companies have a tendency to think of Two-Factor Authentication (2FA) as the same as MFA. But the Truth Is: 2FA is not MFA, and treating them as interchangeable is a dangerous misconception—especially for businesses […]

Google to Replace SMS with QR Codes for Gmail Authentication
A Step Forward Google recently announced it will move from SMS to QR code-based authentication for Gmail accounts. This marks an important shift for cybersecurity, and further validation that companies and individuals are going to have to get beyond Traditional or Weaker security. But is this the best we can do? A Step Toward Stronger […]

The 2025 CrowdStrike Global Threat Report: Vishing and AI-Powered Cyber Attacks On the Rise
Cyber threats evolved rapidly in 2024, with attackers leveraging AI-driven social engineering, malware-free intrusions, and cloud-focused exploits. The newly released 2025 CrowdStrike Global Threat Report underlines critical shifts in cybercrime, particularly the surge in vishing (voice phishing) and identity-based attacks. Key Findings from the CrowdStrike Report 1. The Rise of Vishing: Voice Phishing Surges Fivefold […]

AI vs. AI / Fighting AI with AI in Cybersecurity
The Rise of AI-Powered Cyber Attacks Cybercriminals are increasingly leveraging artificial intelligence (AI) to launch sophisticated attacks. From AI-generated phishing emails to deepfake social engineering scams, traditional security methods are struggling to keep up. To combat this growing threat, businesses must fight AI with AI, deploying advanced security solutions that detect, analyze, and neutralize AI-driven […]

Implementing MFA: Tackling Top Challenges for CISOs
What is the Biggest Issue CISOs Face When Implementing MFA? The biggest challenge for CISOs implementing Multi-Factor Authentication (MFA) is balancing security and user experience. Traditional MFA or 2FA methods, such as SMS-based codes or mobile authenticator apps, often lead to: Additionally, managing MFA across diverse applications and environments poses integration and scalability challenges, further […]

Lessons Learned in Cybersecurity in 2024 – to Help Build a Better 2025
Introduction As we wrap up another year, what lessons have we learned in Cybersecurity that will help us build a better 2025? One thing is certain, we saw progress in 2024. But, this is on both sides of the fence. While technological advancements delivered better cybertools, cybercriminals also grew more sophisticated and reminded us that […]

How to Phish-Proof Your Login
Across the Enterprise You’ve heard it before: Phishing is the #1 method used by cybercriminals to gain access to your digital valuables. Today, according to CSO Online, 80% of reported security incidents are caused by Phishing. We’ve also heard from CISA and others that MFA is the holy grail for cybersecurity. But then last week, […]