Employee offboarding: Why companies must close a crucial gap in their security strategy
Don’t get phished! How to be the one that got away
Microsoft thwarts record‑breaking DDoS attack
Ransomware cost US companies almost $21 billion in downtime in 2020
FontOnLake: Previously unknown malware family targeting Linux
Google to turn on 2FA by default for 150 million users, 2 million YouTubers
To the moon and hack: Fake SafeMoon app drops malware to spy on you
UEFI threats moving to the ESP: Introducing ESPecter bootkit
Hackers could force locked iPhones to make contactless payments
ESET Threat Report T2 2021
CISA and NSA release guidance for securing VPNs
Google releases emergency fix to plug zero‑day hole in Chrome
Bug in macOS Finder allows remote code execution
FamousSparrow: A suspicious hotel guest
Plugging the holes: How to prevent corporate data leaks in the cloud
European police dismantle cybercrime ring with ties to Italian Mafia
Microsoft Patch Tuesday fixes actively exploited zero‑day and 85 other flaws
WhatsApp announces end‑to‑end encrypted backups
What is a cyberattack surface and how can you reduce it?
Beware of these 5 common scams you can encounter on Instagram
Howard University suffers cyberattack, suspends online classes in aftermath
ProtonMail forced to log user’s IP address after an order from Swiss authorities
BladeHawk group: Android espionage against Kurdish ethnic group
Twitter introduces new feature to automatically block abusive behavior
Vaccine passports: Is your personal data in safe hands?
Flaw in the Quebec vaccine passport: analysis
Don’t use single‑factor authentication, warns CISA
Man impersonates Apple support, steals 620,000 photos from iCloud accounts
Microsoft Power Apps misconfiguration exposes millions of records
The SideWalk may be as dangerous as the CROSSWALK
Are you, the customer, the one paying the ransomware demand?
Health authorities in 40 countries targeted by COVID‑19 vaccine scammers
Nearly 2 million records from terrorist watchlist exposed online
Dumpster diving is a filthy business
Examining threats to device security in the hybrid workplace
IISerpent: Malware‑driven SEO fraud as a service
Ransomware runs rampant, so how can you combat this threat?
Deepfakes – the bot made me do it
DEF CON 29: Satellite hacking 101
IISpy: A complex server‑side backdoor with anti‑forensic features
Is your personal information being abused?
Why cloud security is the key to unlocking value from hybrid working
Black Hat 2021 – non‑virtual edition
On course for a good hacking
Tackling the insider threat to the new hybrid workplace
Leading cybersecurity agencies reveal list of most exploited vulnerabilities of the past 2 years
Booking your next holiday? Watch out for these Airbnb scams
Most Twitter users haven’t enabled 2FA yet, report reveals
Apple releases patch for zero‑day flaw in iOS, iPadOS and macOS
Popular Wi‑Fi routers still using default passwords making them susceptible to attacks