This article will explore the early days of malware in the Philippines, examining the characteristics and impact of the ...
Sometimes, the oldest cyber attacks in the book emerge with a new and worrying twist—here’s why you shouldn’t always hold ...
Earlier this year, the US government warned state governors about foreign hackers carrying out disruptive cyberattacks against water and sewage systems. Increasing digitisation of our lives has meant ...
Malware is the scary boogeyman of computers, supposedly capable of destroying everything you know and love. But what does it ...
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while ...
Given AI’s domination in headlines over the past year, it will come as no surprise to most people that it was at forefront of ...
The U.S. government has made big strides over the past four years in the ongoing fight against the “scourge of ransomware,” ...
Hackers are using a novel technique that abuses extended attributes for macOS files to deliver a new trojan that researchers ...
A phishing campaign using a link that delivers a link that appears to be a Google reCAPTCHA bot-detection dialog.
The most obvious threat may be remote hacking ... and damaging the company’s reputation. Malware and viruses become a concern ...
An alarming surge in ransomware attacks is putting the world's healthcare infrastructure at critical risk, endangering ...
As the number of people working from home continues to rise, it's absolutely essential to prioritize security assurance.