Infostealer has entered the chat
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
357 articles
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
Kaspersky for Linux is now available to home users.
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
A comprehensive guide to configuring privacy and security in ChatGPT: data collection and usage, memory, Temporary Chats, connectors, and account security.
Attackers are abusing legitimate websites to host hidden SEO links. We break down their tactics, and what you can do about it.
Running a small or medium-sized business today is like steering a boat across busy waters. The leadership team and decision makers focus on customers, employees, and keeping operations afloat. But
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
Official gaming websites and platforms may seem safe, but even there gamers occasionally encounter malware. We break down infection cases involving Endgame Gear, Steam, and Minecraft.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
WordPress sites are increasingly becoming targets of attacks exploiting vulnerabilities in plugins and themes. In this post, we examine recent cases and share protection tips.
We’ve uncovered a new Trojan — Efimer — which steals cryptocurrency via the clipboard. Here’s how it functions, and how you can stay protected.
Drawing from INTERPOL’s just-released Africa Cyberthreat Assessment Report, we identify which threats most often target developing businesses – and how to stop them.
Malicious actors are busy setting up fake Netflix websites, trying to trick visitors into paying for supposedly legitimate subscriptions, and promising in-game currency and skins for popular games. How else are they scamming Gen Zers, and what can we do to fight back?
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite games from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
This post examines a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite streaming services, films, series and anime from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
We explain where and how to view porn without risking the security of your devices or your wallet.
Spoiler: nothing good. Along with pirated software, you’ll probably pick up a miner, stealer, or backdoor.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.