Ransomware’s cryptofootprint
Cybercriminals made off with more than $16 million from ransomware from 2016 to 2017.
1055 articles
Cybercriminals made off with more than $16 million from ransomware from 2016 to 2017.
Hell hath no fury. A former medical device supplier sabotages deliveries to customers.
No one should be using the dead technology, and any websites that still use it need an update.
“Zyfwp,” an admin-level account with a hard-coded password, discovered in several networking devices made by ZyXel.
Why backing up is good but not enough when it comes to staying safe from ransomware.
Our method for training models to filter out spam lets you maintain privacy without losing efficiency.
Research seeks to understand key drivers of the future of work.
Among its other troubles, 2020 will be remembered as a year of explosive growth in ransomware infections.
We have updated our Open Threat Intelligence Portal, a tool for experts and security analysts.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
Security training aimed at IT teams, service desks, and other technically advanced staff.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
A shared work environment can facilitate malware distribution. We have just the means to stop it.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.