To begin with, each of you has faced this challenge. Namely, the infestation with advertising: pop-up windows, banners on your screen left and right when you want to do your job or find the needed information in the browser. It comes from nowhere, and often when you click on
If you are one of those people who actually contemplate on whether to buy a new antivirus solution, we can only envy your confidence. These days going into the cyber world without any antivirus can sometimes be a risky escapade. Just read recent news headlines from the IT
Sultan Qasim Khan, a security consultant of the NCC Group, has disclosed a vulnerability that allows attackers to enter the salon and steal a Tesla car. The vulnerability consists of the redirection of communication between the Tesla owner’s smartphone or key fob and
An unknown hacker attacked German users who are interested in information about the Russian invasion of Ukraine, infecting them with PowerShell RAT malware (more precisely, a remote access trojan) and stealing their data. Let me remind you that we wrote that Hacker groups
In May, Microsoft released a security update, as it had previously not fully coped with attacks called PetitPotam. The update and mitigation recommendations target a heavily exploited vulnerability in NTLM Relay called Windows LSA Spoofing Vulnerability with the number
The term IP address means a unique address that will identify users and their devices on the internet or local network. The abbreviation IP stands for “Internet Protocol” which is a set of rules of how data is being sent over the internet or local network.
Many of us have probably noticed various security-related markings around browsers’ address bars, but our understanding of what it all meant remained vague. These things are a closed padlock icon, green and yellow highlighting of the link, and, if something is wrong,
Canadian defense contractor Top Aces Inc became the victim of a ransomware attack. LockBit group, an infamous ransomware gang known for its strict principles, already claimed responsibility. They boasted of it by posting the logotype of this company on their Darknet site.
Following recent fixes for a large number of UEFI vulnerabilities, worldwide-known PC and laptop vendor HP is releasing a new BIOS update. This time around, two serious vulnerabilities affecting a wide range of over 200 PC and laptop models that allow code to run with kernel
Spyware can definitely be called the most sophisticated malware these days. It never acts openly, using tricky techniques, and appears more and more often together with other viruses. Together with its brother-in-law – stealer malware – spyware helps the