A Newly Exposed Linux Utility Backdoor Leaves Nearly Every Distro Vulnerable, Here’s What to Do by David Delony April 3, 2024 April 3, 2024 Read more
How Scammers Are Using Your Face to Commit Fraud by Simon Batt February 24, 2024 February 24, 2024 Read more
LockBit Is Down, But These Top 5 Other Ransomware Threats Will Take Its Place by Gavin Phillips February 23, 2024 February 23, 2024 Read more
Political Deepfake Controls on Meta, Spot Phishing Emails, and What Is a Gaming IEM? [Podcast] by Christian Cawley November 24, 2023 November 24, 2023 Read more
What Is Dropper as a Service? The Delivery Service for Malware Developers by Simon Batt November 22, 2023 November 22, 2023 Read more
How to Detect a Keylogger on Your Smartphone by Shannon Flynn November 21, 2023 November 21, 2023 Read more
Were You a Victim of the MOVEit Breach? Here’s What You Need to Know by Chioma Ibeakanma November 15, 2023 November 15, 2023 Read more
Don’t Download the Google Bard App—It’s Malware by Conor Coyle November 14, 2023 November 14, 2023 Read more
What Is a Cold Boot Attack and Can You Defend Against It? by Fatih Küçükkarakurt November 11, 2023 November 11, 2023 Read more
The 10 Biggest Crypto Hacks and Scams of 2023 by Katie Rees November 5, 2023 November 5, 2023 Read more