Weaponizing game code to attack a company
An unusual case of an attack executed by weaponizing legit video game code.
404 articles
An unusual case of an attack executed by weaponizing legit video game code.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
Microsoft has released patches for more than 140 vulnerabilities, some of which need to be closed as soon as possible.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Our experts studied the shadow market for initial access to corporate infrastructure.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
For Anti-Ransomware Day, we decided to publish few tips that will help your company avoid falling victim to ransomware for a second time.
Time to update Windows! Microsoft has released patches for several dozen vulnerabilities, one of which cybercriminals are actively exploiting.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
Our cryptanalysts have found a way to decrypt files encrypted by Yanluowang.
Our experts investigated the activity and studied tools of ransomware gang BlackCat.
Microsoft patches 128 vulnerabilities in a list of products, including Windows and its components.
Researchers found critical vulnerability in Spring, a popular Java framework. Here’s how it works, why it’s dangerous and how to protect from it.
HermeticRansom cryptor was used as a distraction to support HermeticWiper attacks.