Sandbox for experts
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
1183 articles
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
An integrated approach arms even small companies with automated tools that repel complex attacks.
At WWDC 2020, Apple rolled out App Clips for iOS. We explain what that — as well as Android Instant Apps — is.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Digitalization opens up great opportunities, but at the same time it means that exposure to cyberthreats is increasing. What should we do about that?
A particular type of malware seeks user credentials, including accounts for gaming services such as Origin, Battle.net, and Uplay.
The abundance of work-related cloud tools and services calls for smart password handling.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
It’s hard not to worry when you don’t know where your child is. We explain how to pinpoint their location and save your nerves.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
The mass shift to working from home has made ransomware an even greater threat.