
Lessons learned from the trojanized KeePass incident
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
4209 articles
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
This post examines a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.
Our experts at GReAT have uncovered a dangerous vulnerability in a smart-home control app that allowed attackers to disable physical security systems.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
Scammers are using Google ads to push fake versions of real websites – and they’re after business accounts and company data.
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite streaming services, films, series and anime from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
How organizations implement zero-trust principles, and what CISOs advise for project success.
Scammers are exploiting Google services to send fake law enforcement inquiry notifications, making them look like they originate from accounts.google.com.
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
This is your World Password Day reminder about how to create strong passwords and remember them.
An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.
A popular blogger’s Instagram account was hijacked using a SIM-swap attack, and deepfakes were generated to scam followers.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?