
E-mail with a malicious link
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
469 articles
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
Our technologies detected targeted attacks involving a number of zero-day exploits.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.
At the 2021 RSA Conference, a panel of experts discusses the need for better collaboration in thwarting cybercrime.
A ransomware attack forced Ireland’s healthcare service to shut down its servers. Here’s what we know so far.
Should you contact authorities about ransomware?
The Galactic Empire’s heirs analyzed for cybersecurity.
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.
The most active groups targeting companies, encrypting data, and demanding ransom.