Watch out for keylogging/keyloggers
Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.
How does this clever Linux Trojan operate?
Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.
Highlights since just before the Russian invasion
This blog post provides you with a timeline of some cybersecurity highlights since shortly before Russia invaded Ukraine up to this point.
The emergence of WhisperGate as the first worrying sign
Although Russia has not invaded Ukraine so far, cyberattacks attributed to that world power have again been reported and could escalate into a cyberwar.
Clues in the investigation of cyberattacks
We describe the kinds of technical traces left in the phases of a cyberattack and talk about how they may help the attribution process.
Emotet may be back for the crown as king of malware
Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.
Android devices are catching FluBot and TangleBot
Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.
Find out about LockBit, now in its menacing 2.0 version
In this post, you'll learn in general terms what LockBit ransomware is, what its characteristics are and why it can pose a significant threat to your business.
The spyware that threatens the world
In this post, we will look at the software everyone is talking about: Pegasus.