Making a better sandbox
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
366 articles
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.
Full review of a fake cryptowallet incident. It looks and feels like a Trezor wallet, but puts all your crypto-investments into the hands of criminals.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
Scammers are using social engineering to shake down newly onboarded employees.
We investigate why chip cards are no panacea, and what precautions should be taken when making a payment.
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
Another modification of WhatsApp has turned out to be malicious. We explain what’s happened and how to stay protected.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
Our experts studied the shadow market for initial access to corporate infrastructure.
How installing unknown apps works in various versions of Android, and why you shouldn’t do it.
Guard against ransomers who encrypt your files and demand payment for their safe return.