
Ali Baba and the forty cyberthreats
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
506 articles
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Payment terminals and ATMs in remote locations require a special approach to security.
MITRE tested our solutions in the APT29 evaluation. We explain what the test is, why and how it’s conducted, and what the results mean.
While auditing Web applications, our experts found a vulnerability to enumeration attacks. Here is a description of the problem and how to combat it.
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.