
ClickFix technique: what it is and why it’s dangerous
An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.
Something seems to have gone wrong. Please try again or use the search box above.
An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.
A popular blogger’s Instagram account was hijacked using a SIM-swap attack, and deepfakes were generated to scam followers.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
Researchers have found a way to exploit a security mechanism in a popular machine-learning framework.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?