Zerologon vulnerability threatens domain controllers
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
666 articles
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
Modern computerized car require a secure-by-design platform. And that’s just what we’ve come up with.
The mass transition to working from home clearly shows the best technologies for a secure and convenient remote environment.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
The DeathStalker group targets relatively small companies and their trade secrets.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
Our technologies prevented an attack. Expert analysis revealed the exploitation of two previously unknown vulnerabilities. What you need to know.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
Our experts’ detailed analysis of the prime suspect in the ransomware attack on Garmin.
What is Zero Trust, and why is it attractive for modern business?
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Our experts detected a malware framework that cybercriminals use to attack various operating systems.
Microsoft has released a patch for a critical RCE vulnerability in Windows Server systems.
We explain why you need to back up critical data, even if you trust your equipment 100%.
It turns out that the tale of Ali Baba is a collection of stories from ancient Persia about … cyberthreats?