A half-a-billion-dollar crypto heist
We review a major cryptocurrency theft using spyware inside a PDF.
1182 articles
We review a major cryptocurrency theft using spyware inside a PDF.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
How cybercriminals extract bank card details pretending to be DHL.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
Our experts studied the shadow market for initial access to corporate infrastructure.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Here’s how phishers extract phone numbers and credentials from users of Wise.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
What should an incident response specialist be able to do and how can they improve their skills?
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
For Anti-Ransomware Day, we decided to publish few tips that will help your company avoid falling victim to ransomware for a second time.
Time to update Windows! Microsoft has released patches for several dozen vulnerabilities, one of which cybercriminals are actively exploiting.