Threat actors have shifted from traditional credential theft to innovative phishing techniques that exploit legitimate authentication flows. One of the most dangerous of these is OAuth device code phishing, a method that specifically targets Microsoft 365 (M365) accounts by abusing the OAuth 2.0 device authorization grant flow. Unlike conventional attacks that steal usernames and passwords, […]
Industrial Operations Under Siege Cyberattacks targeting industrial operations are spiraling out of control.According to the 2025 Zscaler ThreatLabz report, attacks on Internet of Things (IoT) and Operational Technology (OT) systems have skyrocketed — with the energy sector seeing a 387% surge, while manufacturing and transportation each face nearly one-fifth of all IoT attacks globally. The […]
Weak passwords are the easiest — and most common — route into accounts, networks, and sensitive data. Attackers exploit predictable passwords, password reuse, and poor authentication practices to break into systems quickly and at scale. In fact, password-based attacks remain one of the dominant vectors in the threat landscape. Microsoft This article explains how hackers […]
A cybercrime collective calling itself Scattered Lapsus$ Hunters claims to have stolen data from nearly 40 major global companies — including Qantas, Disney, Toyota, IKEA and others — and is demanding ransom, threatening to publish the stolen records if demands aren’t met. Qantas has obtained a court injunction and says it’s supporting affected customers; Salesforce […]
Africa’s digital economy is booming. With rapid mobile adoption, fintech innovation, and a growing startup ecosystem, the continent is on track to become one of the fastest-growing digital markets in the world. But with opportunity comes risk — and cybercrime in Africa is rising at an alarming pace. According to Interpol’s African Cyberthreat Assessment Report, […]

