
Tomiris backdoor
At the SAS 2021 conference, our experts talked about the Tomiris backdoor, which appears to be linked to the DarkHalo group.
100 articles
At the SAS 2021 conference, our experts talked about the Tomiris backdoor, which appears to be linked to the DarkHalo group.
Cyberattacks most commonly rely on just a few common operating system components.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The Open Management Infrastructure agent, with four vulnerabilities, is being automatically installed on virtual Linux machines on Microsoft Azure.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
How installing unknown apps works in various versions of Android, and why you shouldn’t do it.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Malefactors are looking for vulnerable Confluence servers and exploiting CVE-2021-26084, an RCE vulnerability.
Misconfigured applications built with Microsoft Power Apps leave millions of personally identifiable information entries exposed.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Public Wi-Fi is handy, but it’s not always safe. We demystify cybercriminal techniques and teach you how to stay at least one step ahead.
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
We explore the security settings of one of the most popular chat platforms on the planet.
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
How to distribute patches on company computers without causing disruptions.