
Beware of stealers disguised as… wedding invitations
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
178 articles
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
Scareware is malware that scares users into doing something risky. Here’s how it works.
AI is changing the game, but are we ready for the risks? Discover key insights from our APAC Cybersecurity Weekend 2024 on how to tackle AI-driven threats and secure the future.
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
From the alarming rise of AI-powered cyberthreats to the often-overlooked human factor, discover how the interplay of technology and human behaviour shapes the future of cyber-defence in India.
Dive into the depths of AI’s promised game-changing effects and also its perils, emerging AI threats, and our CEO’s vision for cyber immunity at our APAC Cybersecurity Weekend 2023.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
What signs may indicate that a device is infected or being attacked by a hacker.
The top-4 technologies in use today that long belong in a museum.
Although malware most often infiltrates corporate infrastructure through e-mail, it’s not the only infection method.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that’s no reason to relax, and here’s why.
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.