115 articles
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Public Wi-Fi is handy, but it’s not always safe. We demystify cybercriminal techniques and teach you how to stay at least one step ahead.
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
We explore the security settings of one of the most popular chat platforms on the planet.
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
How to distribute patches on company computers without causing disruptions.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.
Blocking a threat isn’t enough; you have to understand and reconstruct the whole infection chain.
A zero-day vulnerability in Microsoft Windows may already have been exploited.
Unknown attackers tried to add a backdoor to PHP scripting language source code.
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.