Apple’s new feature promises enhanced protection in the fight against targeted attacks.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
How cybercriminals attack companies without using malware.
We review a major cryptocurrency theft using spyware inside a PDF.
Work e-mails stamped “verified” should set alarm bells ringing.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
We review a recent study on biometric authentication that uses breath analysis.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The APKPure app store has been infected by a malicious module that downloads Trojans to Android devices.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
We explain how to best secure your Vivino profile.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
How to remove browser ads in two clicks using our Anti-Banner feature.