The North Korean state-sponsored hacker group Kimsuki is using malicious QR codes in spearphishing campaigns that target U.S.
Abstract: Paper surfaces with intertwisted fibers exhibiting unique physically unclonable features (PUFs) have been used for “fingerprinting” purposes. Prior work demonstrated the feasibility of using ...
Attackers trick users into approving access on real Microsoft pages OAuth device code phishing surged sharply since September 2025 Both cybercriminals and state-linked actors reportedly use this ...
Abstract: Currently, the majority of authentication mechanisms in vehicular ad hoc networks (VANETs) are predominantly based on elliptic curve cryptography (ECC). However, with the rise of quantum ...
A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims' Microsoft 365 credentials and conduct account takeover ...
Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure. Cybersecurity company Arctic Wolf said it observed ...