Cyberattack analysis and quick response
Blocking a threat isn’t enough; you have to understand and reconstruct the whole infection chain.
3876 articles
Blocking a threat isn’t enough; you have to understand and reconstruct the whole infection chain.
A zero-day vulnerability in Microsoft Windows may already have been exploited.
The APKPure app store has been infected by a malicious module that downloads Trojans to Android devices.
Ransomware, once represented by screen blockers that were almost cute, has come of age.
Ransomware operators sometimes resort to rather unconventional threats to get their victims to pay.
Unknown attackers tried to add a backdoor to PHP scripting language source code.
What’s the difference between the malware adapted for Apple’s new M1 chip and the sort written for good old x86 processors.
At home, whether you’re trying to work or to rest, noisy neighbors can be a real nuisance. Modern technologies can help.
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.
A new scam is targeting users of popular Discord cryptocurrency servers.
A year has passed since lockdown began. We view the pandemic and its consequences through the prism of IT threats.
Who evaluates security solutions, and how? We report the past year’s tests and awards.
Stalkerware activity dropped off during the pandemic, but it’s picking up again. How to deal with the threat.
Scammers are cashing in on the PlayStation 5 shortage. Here’s how to avoid their bait.
A server configuration oversight caused data from SuperVPN, GeckoVPN, and ChatVPN users to leak online. It’s now for sale on a hacker forum.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
A vulnerability in Google Chrome has already been exploited by malefactors. All users need to update to version 89.0.4389.90.
Vietnam started a coordinated anticybercrime campaign at the government level in 2020. The results are amazing.