On 3rd of September, we were hosting our “Experts Talk. Why master YARA: from routine to extreme threat hunting cases“, in which several experts from our Global Research and Analysis Team and invited speakers shared their best practices on YARA usage. At the same time, we also presented our new online training covering some ninja…
Botnets and IoT devices are forming a perfect storm for IT staff wrestling with WFH employee security.
A researcher said he discovered an open data cache with names, grades, birthdates and more, after the Clark County School District refused to pay the ransom.
Threatpost’s latest poll probes telehealth security risks and asks for IT cures.
Researchers warn of emails pretending to help business employees upgrade to Windows 10 – and then stealing their Outlook emails and passwords.
FinSpy has returned in new campaigns targeting dissident organizations in Egypt – and researchers uncovered new samples of the spyware targeting macOS and Linux users.
The Ryuk ransomware is suspected to be the culprit.
September saw dozens of Joker malware variants hitting Google Play and third-party app stores.
Twitter has fixed a caching issue that could have exposed developers’ API keys and tokens.
Four leading voices in the bug bounty community answer frequently asked questions from bounty hunters, companies and curious cybersecurity professionals.