Five easy ways to recognize and dispose of malicious emails

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find them.

Read more

Internet Shortcut used in Necurs malspam campaign

The Necurs gang tries out a new trick to load malware and bypass security defenses.

Read more

Labs CTNT report shows shift in threat landscape to cryptomining

What did we learn about cybercrime in the quarterly Labs CTNT report? Malicious cryptomining has taken over in 2018, and it’s leaving all other malware families behind.

Read more

Know your threats: the nine scariest malware monsters

It’s been a particularly ghoulish year in cybersecurity, from Russian hacks to ransomware outbreaks. The bad boogey man in the black hoodie has been pulling one over the collective public. It’s dark and creepy, but users refuse to stop peeking behind the door. It’s enough to make even the most grizzled IT admin run for…

Read more

Old MS Office feature weaponized in malspam attacks

An old Microsoft Office feature has been brought back to the forefront as way to distribute malware without relying on macros or exploits.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language