AI and the new reality of sextortion
Generative AI has taken sextortion techniques to a whole new level — now, any social media user can become a victim. How can you protect yourself and your loved ones?
120 articles
Generative AI has taken sextortion techniques to a whole new level — now, any social media user can become a victim. How can you protect yourself and your loved ones?
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
How automation turns legitimate tools into a channel for malware delivery.
How researchers hacked DeckMate 2 card shufflers, and how the mafia exploited those very vulnerabilities to cheat at poker.
How malicious extensions can spoof AI sidebars in the Comet and Atlas browsers, intercept user queries, and manipulate model responses.
Malicious actors have started utilizing a new variation of the ClickFix technique — named “FileFix”. We explain how it works, and how to defend your company against it.
Official gaming websites and platforms may seem safe, but even there gamers occasionally encounter malware. We break down infection cases involving Endgame Gear, Steam, and Minecraft.
WordPress sites are increasingly becoming targets of attacks exploiting vulnerabilities in plugins and themes. In this post, we examine recent cases and share protection tips.
Deepfake videos, fraudulent Instagram and Facebook accounts, private WhatsApp chats: how Mark Zuckerberg’s social media platforms have become a primary tool for investment scammers.
Attackers hijack Discord invite links and redirect victims to scam servers to install malware using the ClickFix technique.
How the research tool Defendnot disables Microsoft Defender by registering a fake antivirus, and why you shouldn’t always trust what your operating system says.
This is a story of how a blockchain developer lost US$500 000 to a fake Solidity extension from the Open VSX marketplace.
Funny hacks that became internet legends: talking traffic lights, a high-school Rickroll, robot vacuums on the rampage, a Lenovo defacement, and a Burger King hijack.
Researchers have found several vulnerabilities in the Sitecore CMS platform that enable unauthenticated remote code execution (RCE).
Since 2016, a threat actor has been exploiting insecure plugins and themes to infect WordPress websites and redirect traffic to malicious websites.
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
Scammers are using Google ads to push fake versions of real websites – and they’re after business accounts and company data.
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
Scammers are exploiting Google services to send fake law enforcement inquiry notifications, making them look like they originate from accounts.google.com.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.