
How AI creates “slopsquatting” supply-chain risks
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
455 articles
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?
Scammers are exploiting GetShared to bypass email security.
Attackers use the polyglot technique to disguise malware. We explain what it is and how to protect your company against attacks.
Fending off ransomware attacks that exploit corporate IoT devices.
Our technologies have helped to detect the zero-day vulnerability CVE-2025-2783 in Google Chrome, which was used in a sophisticated APT attack.
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
How to respond to a compromised GitHub changed-files Action incident.
Microsoft’s March Patch Tuesday fixes several vulnerabilities that have already been used in the wild. Details are not clear at the moment, but it’s worth installing the patches ASAP.
We’ve added technology that checks QR codes in emails for phishing links.
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
Just a few hours before 2025, we recorded a surge in cryptominer distribution through video games. Interestingly, not only home PCs but also corporate machines were affected.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Researchers have discovered a vulnerability in the 7-Zip file archiver software.
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Cybercriminals distributing the Mamont banker under the guise of an application for tracking the delivery of goods at wholesale prices.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.