The Shang-Chi Malware Campaign: Is your pirated copy of the summer...
A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...
A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...
How do modern underground marketplaces operate? What are digital goods and how have they played a major...
The popularity of Active Directory makes it a juicy target for cyber extortion. Here are some quick...
Here are some reasons why you should replace your brand monitoring solutions with a digital brand protection...
Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and...
Zero-days are software vulnerabilities that are not known to the developers. Here's a list of the most...
In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the...
Third-party applications may thus seem innocent, but could in fact be nefarious and have grave implications on...
All browser extensions may not be malicious, but they are dangerous. We explain how extensions exploit permissions...
This blog details the build process of Single-Page Applications, and explains how they alter the security implications...