Critical vulnerability in Apache Log4j library
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
1123 articles
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
We analyze some typical examples of phishing bait for movie streamers.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals.
Just like many other modern devices, seemingly “dumb” feature phones are much smarter than you might think. And this may be a problem.
FinSpy spyware targets Android, iOS, macOS, Windows, and Linux users. Here’s what it can do and how to stay protected.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Guard against ransomers who encrypt your files and demand payment for their safe return.
One version of popular WhatsApp mod FMWhatsApp uses an infected advertising module that downloads Trojans to smartphones.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spammers are using malicious macros to distribute IcedID and Qbot banking malware in seemingly important documents.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.