
How to repair DMARC
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
469 articles
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
Our technologies prevented an attack. Expert analysis revealed the exploitation of two previously unknown vulnerabilities. What you need to know.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
What is Zero Trust, and why is it attractive for modern business?
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Our experts detected a malware framework that cybercriminals use to attack various operating systems.
Microsoft has released a patch for a critical RCE vulnerability in Windows Server systems.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Our experts uncovered a scheme to extract cardholder data using Google tools.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To protect ADAS from external interference, cars need a special approach to cybersecurity.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
How to find an individual approach for each employee without committing to a personal mentor for everyone.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.