
How to survive digitalization
Drawing from INTERPOL’s just-released Africa Cyberthreat Assessment Report, we identify which threats most often target developing businesses – and how to stop them.
750 articles
Drawing from INTERPOL’s just-released Africa Cyberthreat Assessment Report, we identify which threats most often target developing businesses – and how to stop them.
Can you ditch passwords entirely for passkeys? We explore when it’s possible, and when it’s still a challenge.
First, don’t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.
How to assess all the complexities of open-source application integration in advance, and choose the most efficient solutions.
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite games from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
While open-source projects let you build almost any infosec solution, it’s crucial to realistically assess your team’s resources and the time it would take to achieve your goals.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
How organizations implement zero-trust principles, and what CISOs advise for project success.
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
This is your World Password Day reminder about how to create strong passwords and remember them.
Researchers have found a way to exploit a security mechanism in a popular machine-learning framework.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
What information does an MDR service need to protect a company from complex targeted attacks?
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.