Ransomware: what protects against it best?
The results of AV-TEST’s thorough research on the ability of cybersecurity products to tackle ransomware are shocking and scary.
435 articles
The results of AV-TEST’s thorough research on the ability of cybersecurity products to tackle ransomware are shocking and scary.
Testing 11 advanced security solutions against the latest ransomware threats.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
The Open Management Infrastructure agent, with four vulnerabilities, is being automatically installed on virtual Linux machines on Microsoft Azure.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
Our first transparency report addresses requests from law enforcement agencies and government organizations worldwide.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Misconfigured applications built with Microsoft Power Apps leave millions of personally identifiable information entries exposed.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
Why using a corporate mail account for personal matters is not a good idea
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
Many companies throw out information that can pose a security or reputational risk.