Watch out for keylogging/keyloggers
Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.
Benefits and risks of these increasingly used programs
We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.
How does this clever Linux Trojan operate?
Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.
Insider attack suspect was arrested this month
An individual was arrested for extorting Ubiquiti, the company where he worked as a developer. In this post, we narrate the key points of his attack.
Here's what happened this year, in case you missed it
Supply chain attacks, ransomware and data leaks: We give you a short summary of the major cyberattacks of 2021.
All of Argentina's population IDs stolen and for sale?
This new leak may compromise more than 45M people. Read this post to learn who the attacker is, how he gained access and his connection with past leaks.
Android devices are catching FluBot and TangleBot
Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.
What is the Dark Web and what do we find there?
I wrote this post to give you an overview of what the Dark Web is, how we get in, and what we can find within it.
You could be a victim of Credential Stuffing
I wrote this post to give you an overview of the Credential Stuffing attack and some short recommendations for its prevention.