Which hacker group is attacking your corporate network? Don’t guess, check!
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
3884 articles
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
The abundance of work-related cloud tools and services calls for smart password handling.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
Alongside their benefits, cloud solutions for file storage and document or project management can cause many problems.
Dave and Jeff discuss how to keep personal data safe while protesting, the kerfuffle around NHS coronavirus texts, and more.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
It’s hard not to worry when you don’t know where your child is. We explain how to pinpoint their location and save your nerves.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Dave and Jeff sit down with Marco Preuss to discuss the ethics of social ratings, masked selfies, and more.
Your parents brought you into the digital world. Time to return the favor and raise them right as well.
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
Hans Christian Andersen’s report on the Kai infection incident, and the investigation by infosec expert Gerda.
On this podcast, Dave and Jeff talk with Rob Cataldo, chat about the latest with Zoom, report on nation-states spying on COVID-19 research, and more.
The mass shift to working from home has made ransomware an even greater threat.
In addition to its primary targets, ransomware has infected some unusual devices.