
Scammers exploiting GetShared for phishing attacks
Scammers are exploiting GetShared to bypass email security.
2962 articles
Scammers are exploiting GetShared to bypass email security.
Spoiler: nothing good. Along with pirated software, you’ll probably pick up a miner, stealer, or backdoor.
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
Attackers use the polyglot technique to disguise malware. We explain what it is and how to protect your company against attacks.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
Fending off ransomware attacks that exploit corporate IoT devices.
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
Our technologies have helped to detect the zero-day vulnerability CVE-2025-2783 in Google Chrome, which was used in a sophisticated APT attack.
How to counter new privacy invasions by browser developers
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
How to respond to a compromised GitHub changed-files Action incident.
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
Microsoft’s March Patch Tuesday fixes several vulnerabilities that have already been used in the wild. Details are not clear at the moment, but it’s worth installing the patches ASAP.
Takeaways for regular crypto holders from the biggest crypto heist in history.
We’ve added technology that checks QR codes in emails for phishing links.
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
Cybercriminals are blackmailing YouTube bloggers into posting malware links in their video descriptions.
ACCEPT AND CLOSE
Notifications