New 2FA phishing kit Astaroth threatens user logins

Posted by George Slade on Apr 9, 2025 10:40:55 AM

The history of computing has been marked by an arms race between cyber criminals and security professionals, each seeking to outdo the other and gain a precious advantage – leading to constant innovations on both sides. With phishing kit Astaroth seeking to bypass the protection provided by two-factor authentication (2FA), this blog looks at exactly how the cyber threat works and how you can...

Continue reading

Topic IT IT security

divider

IT security vs cyber security: the foundation vs the frontier

Posted by FluidOne on Mar 24, 2025 02:52:44 PM

Securing IT infrastructure is an essential part of modern-day business. But while IT security provides a crucial foundation for protecting systems, data, and networks, it’s not enough to stand alone in an era where cyber threats are becoming increasingly sophisticated. Here's why IT security should be viewed as just one piece of the puzzle, with cyber security stepping in to fill the critical...

Continue reading

Topic IT cyber security IT security

divider
Subscribe to our email updates