News

Security awareness tips, industry news, and product updates.

Security analyst reviewing a suspicious device login code on a laptop
Phishing & Social EngineeringSecurity Awareness TipsThreat Intelligence

Device Code Phishing Is Moving Into Criminal Toolkits

Device code phishing is spreading through criminal toolkits and phishing-as-a-service offerings. Here is how the Microsoft 365 attack works and what teams should do next.

Marcus Chen·5/15/2026·8 min read
Driver checking a suspicious toll payment text message on a mobile phone
Phishing & Social EngineeringSecurity Awareness TipsThreat Intelligence

Road Toll Smishing Scams: Lessons from Operation Road Trap

Bitdefender's Operation Road Trap research shows how toll, parking, and traffic-fine smishing has scaled across countries. Here is what employees and security teams should watch for.

Elena Vasquez·5/15/2026·7 min read
Security team reviewing a suspicious compliance email on a laptop
Phishing & Social EngineeringSecurity Awareness TipsThreat Intelligence

Microsoft AiTM Phishing Alert: Lessons for US Teams

Microsoft is warning US organizations about a sophisticated code-of-conduct phishing campaign using PDFs, CAPTCHA gates, and AiTM token theft. Here is what security teams should watch for next.

Rachel Andersen·5/6/2026·7 min read
Marketing employee reviewing a social media account alert on a laptop
Phishing & Social EngineeringSecurity Awareness TipsThreat Intelligence

Facebook Phishing Through Google: What Teams Should Do

A new campaign abused Google AppSheet emails to steal Facebook business accounts at scale. Here is what your team should watch for and how empowsec helps build the right response habits.

Marcus Chen·5/5/2026·7 min read
Employee reporting a suspicious email from their Gmail inbox
Security Awareness TipsProduct Updates

Report Suspicious Emails Directly from Gmail with empowsec

Our new Google Workspace add-on lets employees report phishing, spam, and suspicious emails with one click — right from their Gmail inbox. Here's how it works and why it matters.

Marcus Chen·5/2/2026·6 min read
Professional reviewing a cybersecurity compliance checklist at their desk
Security Awareness Tips

Cybersecurity Awareness Checklists for Every Team

Practical, role-specific cybersecurity checklists your organization can implement today — from daily habits for every employee to quarterly reviews for IT leadership.

Elena Vasquez·5/1/2026·9 min read
Aerospace technology and rocket engineering facility representing the defense software targeted in the spear-phishing campaign
Phishing & Social EngineeringThreat Intelligence

Chinese Spy Used Spear Phishing to Steal NASA Defense Software

A Chinese national posed as U.S.-based researchers for years, using spear-phishing emails to trick NASA employees and military personnel into handing over restricted aerospace software. The case is a masterclass in why identity verification matters.

Marcus Chen·4/30/2026·7 min read
A colorful party invitation envelope being opened, symbolizing a potential phishing scam
Phishing & Social EngineeringSecurity Awareness Tips

Fake Party Invitations Are the Newest Phishing Trap

Cybercriminals are spoofing Paperless Post, Evite, and Punchbowl to send fake party invitations that exploit your fear of missing out. Here's how the scam works and how to protect yourself.

Rachel Andersen·4/29/2026·7 min read
Two professionals shaking hands over a business partnership agreement
For MSPs & PartnersProduct Updates

Earn Recurring Revenue with the empowsec Affiliate Program

Security awareness training is one of the fastest-growing segments in cybersecurity. The empowsec affiliate program lets you earn generous recurring commissions by referring organizations to a platform they genuinely need.

Rachel Andersen·4/24/2026·6 min read
Person scanning a QR code on a smartphone with a laptop open in the background
Phishing & Social EngineeringSecurity Awareness TipsThreat Intelligence

Quishing in 2026: The QR Phishing Tricks Your Tools Still Miss

QR code phishing has evolved far beyond a simple scan-and-steal. Split codes, Unicode fakes, CAPTCHA gates, and state-sponsored campaigns are rewriting the rulebook — and most security stacks still can't read a QR code.

Elena Vasquez·4/22/2026·13 min read
Healthcare worker reviewing patient records on a secure computer terminal
Compliance & RegulationsThreat Intelligence

NTBHA Breach: 285K Records and HIPAA Lessons for 2026

A three-day intrusion at North Texas Behavioral Health Authority exposed 285,086 patient records. Here's what went wrong and how healthcare teams can harden their HIPAA defenses.

Natalie Hoffmann·4/21/2026·6 min read
Business team reviewing security awareness training platform options on laptops during a meeting
Security Awareness TipsFor MSPs & PartnersProduct Updates

empowsec vs KnowBe4: A Practical Comparison for 2026

Evaluating security awareness platforms? Here's a clear-eyed comparison of empowsec and KnowBe4 across pricing, features, white-label capabilities, and the kinds of organizations each serves best.

James Thornton·4/20/2026·15 min read
« Previous12Next »