LastPass Breach Investigation Goes On, Things are Even Worse
LastPass, owned by GoTo (formerly LogMeIn) and with over 30 million users,…
Qakbot Malware Applies New Distribution Methods
Today there is an arms race between cybercriminals and antimalware manufacturers. While…
One Year of Russian-Ukrainian War in Cybersecurity
February 24, 2022, will be a turning point in history. It was…
Five Easy Smartphone Security Tips to Keep It Safe From Hackers
These days, the smartphone is more than just a means of communication.…
How DDoS Can Badly Hurt Your Business
Everyone at least once faced the fact that they cannot go to…
IceBreaker Backdoor Emerged, Exploiting New Phishing Way
A new player has appeared in cyberspace, with surprisingly new methods. A…
Web Application Firewall: Difference Blocklist and Allowlist WAFs
You may have come across a Web Application Firewall (WAF) concept but…
Dangerous Virus & Malware Threats in 2023
Virus and malware threats are constantly evolving and become more sophisticated and…
Huge Ransomware List by Gridinsoft Research – Part #2
We talked a lot about notorious ransomware examples in Part #1 of…
Huge Ransomware List by Gridinsoft Research – Part #1
Ransomware is rightfully considered one of the most dangerous types of malware.…
Android Malware. Is Malware on Android Phone Possible?
Android malware is a common name for all malicious software present in…
TikTok Invisible Challenge Is Used to Spread Malware
TikTok Invisible Challenge became yet another host for threat actors. Crooks found…