Ransomware continues assault against cities and businesses - We take a look at the current chaos faced by local governments across the US, as ransomware continues to snap at its cities' heels.
The lucrative business of Bitcoin sextortion scams - Sextortion scams are back on the radar, and many say they’re on the uptick. We investigate an email campaign to see how lucrative the business of sextortion can be.
Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks - Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?
DEF CON 27 retrospective: badge life redux - Learn about one of our researcher's badge experiences at DEF CON 27.
Magecart criminals caught stealing with their poker face on - This blog post details the curious case of a web skimmer encountered in a poker application.
A week in security (August 12 – 18) - A roundup of the most interesting cybersecurity news stories from August 12 to 18, including a deep dive into facial recognition technology, swatting dangers, social engineering attacks on cities, and more.
How much personalization is too much? - Personalization is the new mantra of marketers—and most people are perfectly okay with that. But when does personalization cross the line into invasive? And what can uncomfortable consumers do about blocking it?
QxSearch hijacker fakes failed installs - QxSearch is a group of search hijackers that try to make the user think the install failed or was incomplete. Is it that they don't want to be found and removed? Or just bad programming?
The Hidden Bee infection chain, part 1: the stegano pack - The Hidden Bee cryptominer has a complex and multi-layered internal structure that is unusual among cybercrime toolkits. That's why we're dedicating a series of posts to exploring its elements and updates made during one year of its evolution.

Select your language