Attacks using Syncro & AI-generated websites
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
54 articles
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
Researchers have discovered that 50% of data transmitted via satellites is unencrypted. This includes your mobile calls and texts, along with banking, military, government, and other sensitive information. How did this happen, and what can we do about it?
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
A paper from Uruguayan scientists lays out a highly technical and impractical method of spying on computer monitors.
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Online dating is great for those looking for love – but beware the risks!
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
Four major studies presented by our experts at the SAS 2023 international conference.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
Are you sure your former colleagues don’t have access to corporate data or systems?
Research seeks to understand key drivers of the future of work.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
What the Hoax verdict means, and why such software is becoming more of a problem.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.