Malware scanner for Linux systems
We’ve released a free application that allows you to scan Linux systems for known cyberthreats.
1182 articles
We’ve released a free application that allows you to scan Linux systems for known cyberthreats.
Cybercriminals prey on corporate credentials by sending phishing links through Dropbox after priming the victim.
Can you catch malware by downloading files from Microsoft’s repositories on GitHub? Turns out, you can. Stay alert!
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
Got a message from your boss or coworker asking you to “fix a problem” in an unexpected way? Beware of scammers! How to protect yourself and your company against a potential attack.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
Another celebration… for scammers. How cybercriminals scam women ahead of March 8.
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
A look at the pros and cons of updating Android — and ways to do it safely.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.