MysterySnail crawls through zero-day vulnerability
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
1183 articles
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
How attackers are most apt to get into target companies’ infrastructure.
IT Security Economics 2021 report: Infosec’s top 5 challenges dealing with complex incidents.
Testing 11 advanced security solutions against the latest ransomware threats.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
At the SAS 2021 conference, our experts talked about the Tomiris backdoor, which appears to be linked to the DarkHalo group.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Airports have always been an attractive target for cybercrime. Here’s how to keep them protected.
Here’s how to open a program if your antivirus app blocks it.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
Our first transparency report addresses requests from law enforcement agencies and government organizations worldwide.
If your antivirus stops you from going to a website, don’t disable it, create exclusions.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Guard against ransomers who encrypt your files and demand payment for their safe return.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.