
119 articles
Tools for giving a well-reasoned explanation of why security solutions are a must-have
Even those who are responsible for arranging security awareness training may not solidly understand what cybersecurity training is, or even why the training is needed.
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
One day I found out that someone was passing off my photos as their own. Here’s what I did.
Our experts have identified at least eight independent threat actors competing for the right to extort money from businesses.
After more than a year of investigation, our experts have a thorough understanding of the Lazarus campaign and advice for protection.
A possible connection between Moonlight Maze, an APT that targeted the Pentagon and NASA in the late 1990s, and Turla, a modern day threat actor.
When an attack combines legitimate tools with fileless malware, it’s extremely difficult to detect, so antimalware teams constantly need to improve their skills
As you probably know, Star Wars: Rogue One has hit the theaters to tell the story of the Rebellion who steal the plans of Death Star and facilitate its destruction.
A company’s business stalls because of a cryptor. The head of IT dept is to solve the problem. But “solving” this time doesn’t mean just “restoring the data”.
Our products have demonstrated the best results for the third consecutive year, achieving a higher percentage of top-three places and received awards than any other vendor: 82%.