Threat news
A selection of our blogs alerting information security professionals to new and emerging threats.
![Telescope on the balcony](https://corrata.com/wp-content/uploads/2024/05/Camera-on-Balcony.jpeg)
Featured Blog
Pegasus, Predator, Hermit Spyware – NSO and its clones-
Jul 22, 2024 · 5 min read
MFA Bypass – Stealing Cookies
Read moreHow Adversary-in-the-Middle attacks undermine multi-factor authentication According to Verizon’s authoritative Data Breach Investigation Report, 90% of data breaches start by…
-
Jul 12, 2024 · 6 min read
Pegasus, Predator, Hermit Spyware – NSO and its clones
Read moreRise in known exploits point to the proliferation of sophisticated cyber-surveillance tools targeting iOS and Android devices. The recent revelation…
-
Mar 27, 2024 · 5 min read
Uncovering a sophisticated QR code phishing attack
Read moreA Case Study on Enhanced Security Measures In a recent cybersecurity incident a sophisticated phishing attack was unveiled, employing QR…
-
Jan 29, 2024 · 4 min read
QR Codes – Sidestepping cyberdefenses
Read moreScan with Caution In the digital age, our defences against phishing have traditionally focused on the familiar: URL scanning, email…
-
Dec 4, 2023 · 4 min read
The most dangerous app on your phone
Read moreThe many ways that cybercriminals target your phone’s messaging app If, like the founding team at Corrata, you’ve been working…
-
Sep 14, 2023 · 15 min read
Deceptive Downloads: The Silent Menace of Trojanized Messaging Apps
Read moreIn today’s digital age, messaging apps have become an integral part of our daily communication. From personal chats to professional…