CyberGate CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
HUB access
CyberGate CyberGate
HUB access
CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
shape
shape
shape
shape

Latest cybersecurity news

  1. Home
  2. Page
Updated on December 13, 2023

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

March 3, 2026 No Comments

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control

Read More »

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

March 3, 2026 No Comments

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with

Read More »

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

March 3, 2026 No Comments

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to

Read More »

AI Agents: The Next Wave Identity Dark Matter – Powerful, Invisible, and Unmanaged

March 3, 2026 No Comments

The Rise of MCPs in the Enterprise The Model Context Protocol (MCP) is quickly becoming a practical way to push LLMs from “chat” into real

Read More »

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

March 3, 2026 No Comments

Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. It’s advertised

Read More »

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

March 3, 2026 No Comments

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass conventional phishing defenses implemented in email and

Read More »
Load More