Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Laptop keyboard illuminated by red light, symbolizing cybersecurity threats targeting law firms.Laptop keyboard illuminated by red light, symbolizing cybersecurity threats targeting law firms.

The Top User-Driven Cyber Threats Targeting Law Firms

Law firms sit on some of the most sensitive and valuable data in the enterprise, and attackers have built an entire playbook around exploiting the users who handle it. Learn how four dominant threat vectors are targeting legal sector workflows in 2026 and what it takes to stop attacks at the User Layer.

April 20, 2026
6 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.
A glass skyscraper photographed from below, its curved facade repeating across hundreds of office windows, illustrating the scale of modern enterprise infrastructure. A glass skyscraper photographed from below, its curved facade repeating across hundreds of office windows, illustrating the scale of modern enterprise infrastructure.

The Workforce Has Expanded: How Attackers Are Targeting Enterprise AI Agents

AI agents are being deployed across the enterprise at scale, and attackers have already started engineering against them. Learn how agentic AI expands the enterprise attack surface in ways legacy security programs were never designed to defend.

April 8, 2026
7 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.
Modern corporate boardroom with a long conference table and executive chairs inside a glass-walled meeting space overlooking a city skyline, representing board-level governance and cybersecurity leadership discussions. Modern corporate boardroom with a long conference table and executive chairs inside a glass-walled meeting space overlooking a city skyline, representing board-level governance and cybersecurity leadership discussions.

Making Cyber Risk Board Ready: Strategies for Winning Boardroom Confidence

Winning board confidence on cyber risk requires more than technical reporting. Security leaders need to support better governance decisions and communicate exposure in a way directors can act on.

March 6, 2026
7 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.
Person filing IRS 1040 tax return at office desk with financial paperwork and cash, representing tax season refund processing and tax scam risk.Person filing IRS 1040 tax return at office desk with financial paperwork and cash, representing tax season refund processing and tax scam risk.

Tax Season Scams: How Refund Fraud Escalates Into Enterprise Risk

Each filing season, threat actors execute coordinated, identity-driven campaigns that begin with refund fraud and rapidly escalate into credential harvesting and enterprise exposure.

February 23, 2026
7 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.
Graphic announcing a new partnership between Dune Security and OmegaBlack with company logos on a dark green backgroundGraphic announcing a new partnership between Dune Security and OmegaBlack with company logos on a dark green background

Dune Security and OmegaBlack Partner to Deliver Intelligence-Driven Protection for the User Layer

Threat actors are building their campaigns across the dark web long before they reach the enterprise. Dune Security and OmegaBlack are partnering to deliver layered protection that connects external exposure with user level risk scoring and automated remediation.

January 20, 2026
3 minute read
Partnerships
This is some text inside of a div block.
This is some text inside of a div block.
Business Process Outsourcing support agent using a headset in a modern office at night, illustrating user cyber risk in outsourced operations. Business Process Outsourcing support agent using a headset in a modern office at night, illustrating user cyber risk in outsourced operations.

How Attackers Exploit Trusted Access in BPO Environments

Learn why BPO environments are increasingly targeted by social engineering and how user cyber risk spreads across outsourced operations and client organizations.

January 15, 2026
7 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.
Senior executive seated alone in a dark office at night, reviewing a message on a smartphone, illustrating the risk of impersonation and executive-targeted social engineering attacks. Senior executive seated alone in a dark office at night, reviewing a message on a smartphone, illustrating the risk of impersonation and executive-targeted social engineering attacks.

How Impersonation-Based Social Engineering Drives Enterprise Cyber Risk

Impersonation-based social engineering attacks are driving disproportionate enterprise risk. Learn why they work and what it takes to defend against them.

January 12, 2026
5 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.
Blurred hospital corridor with multiple healthcare staff in scrubs walking and working, viewed from the center of the hallway. Red emergency lights glow overhead, conveying a busy, high-pressure clinical environment with active hospital operations. Blurred hospital corridor with multiple healthcare staff in scrubs walking and working, viewed from the center of the hallway. Red emergency lights glow overhead, conveying a busy, high-pressure clinical environment with active hospital operations.

Cybersecurity in Healthcare: How Social Engineers Target Patient Data and Hospital Operations

Healthcare’s reliance on digital systems and high-pressure clinical environments has made user risk a patient safety issue, and organizations must rethink how they prepare their workforce for modern attacks.

January 8, 2026
7 minute read
Cybercrime
This is some text inside of a div block.
This is some text inside of a div block.
Graphic announcing a new partnership between Dune Security and Abstract Security. The image features both company logos on a dark background with a green gradient and subtle geometric patterns.Graphic announcing a new partnership between Dune Security and Abstract Security. The image features both company logos on a dark background with a green gradient and subtle geometric patterns.

Dune Security and Abstract Security Partner to Deliver Real-Time Detection and Automated Risk Reduction

Modern attacks often reveal themselves through subtle technical events that most tools miss until it is too late. Dune Security and Abstract Security now bring real-time detection and automated risk remediation into a single defense strategy.

December 18, 2025
5 minute read
Partnerships
This is some text inside of a div block.
This is some text inside of a div block.