Please turn on your JavaScript for this page to function normally.
spoofing

Biometric spoofing isn’t as complex as it sounds
Biometric technologies were originally designed to improve security and streamline authentication, but they’re often misused in ways most people don’t notice. Like any system, …

Email forwarding flaws enable attackers to impersonate high-profile domains
Sending an email with a forged address is easier than previously thought, due to flaws in the process that allows email forwarding, according to a research team led by …

Facebook and Microsoft remain prime targets for spoofing
While trends in phishing frequently evolve, Facebook and Microsoft’s collective dominance as the most spoofed brands continues, according to Vade. Facebook and Microsoft’s …
Featured news
Resources
Don't miss
- Hackers love LOTL, this approach shuts them down
- A2AS framework targets prompt injection and agentic AI security risks
- How to stop a single vendor breach from taking down your business
- CISA says it will fill the gap as federal funding for MS-ISAC dries up
- Webinar: The BAS Summit 2025: Redefining Attack Simulation through AI