Step-by-step guide to setting up two-factor authentication on Google, Apple, Microsoft, and social platforms for stronger account security.
Critical CVE-2026-2329 flaw in Grandstream GXP1600 VoIP phones enables unauthenticated RCE, call interception, and credential theft.
CVE-2026-2329 allows unauthenticated root-level access to SMB phones, so attackers can intercept calls, commit toll fraud, and impersonate users.
Data breach extortion group ShinyHunters used social engineering to steal customer names, addresses and phone numbers from ...
Underground Telegram channels shared SmarterMail exploit PoCs and stolen admin credentials within days of disclosure. Flare explains how monitoring these communities reveals rapid weaponization of CVE ...
Scaling agentic activity means making necessary upgrades in identity governance and authentication. With all those AI agents, ...
The acquisition of Koi Security isn't just a product play — it's a declaration that the agentic era has created an entirely new threat surface, and the ...
Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bugs potentially affect thousands of ...
Howard Ting, CEO of Opal Security is a seasoned cybersecurity and technology executive currently leading Opal Security since November 2025. Prior to this role, he served as Executive in Residence at ...
Hackers have stolen the personal and contact information of nearly 1 million accounts after breaching the systems of Figure ...