UnitedHealth ransomware attack
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
1186 articles
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
Just a few hours before 2025, we recorded a surge in cryptominer distribution through video games. Interestingly, not only home PCs but also corporate machines were affected.
If you still think that Steam, Google Play, and the App Store are malware-free, then read this fascinating story about PirateFi and other hacker creations disguised as games.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
Cybercriminals distributing the Mamont banker under the guise of an application for tracking the delivery of goods at wholesale prices.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Detection of tactics involving malicious DLL registration and other Kaspersky SIEM improvements in Q4 2024.
Scammers posing as buyers snatch one-time codes during online product demos.
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
AI is disrupting security strategies, creating risks alongside opportunities to build more adaptive, effective protection – leaving InfoSec professionals increasingly concerned.