When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle.
The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.
It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following ...
Back in July 2024, cybersecurity vendor KnowBe4 began to observe suspicious activity linked to a new hire. The individual began manipulating and transferring potentially harmful files, and tried to ...
Thanks to advances in technology, buying tickets to your favorite show has probably never been easier – as long as you can sometimes endure virtual queues and you’re not a Swiftie, of course. On the ...
A hacker collective claims to have breached over 50,000 home security cameras before going on to steal people’s private footage and post some of it online. While a considerable portion of the videos ...
use only HTTPS to deliver software updates in order to minimize the risks of domain hijacking and Man-in-the-Middle (MitM) attacks implement file integrity verification using MD5 hashing and file ...
ESET researchers discovered two previously unknown backdoors – which we named LunarWeb and LunarMail – compromising a European ministry of foreign affairs (MFA) and its diplomatic missions abroad. We ...
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous ...
The recent spate of ransomware payments cannot be the best use of cybersecurity budgets or shareholder capital, nor is it the best use of insurance industry funds. So, why are companies paying and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results