It would be great if the process of securing a Windows 10 device can be reduced to a simple checklist. But the process of securing is much more complicated than that. The initial setup simply establishes a security baseline. When this configuration is complete, security needs continued vigilance and ongoing effort. A big part of…
Misconfigured Amazon S3 Buckets allowing man-in-the-middle attacks (MiTM).
A number of Russian media and state institutions of Ukraine were attacked by the new ransomware Bad Rabbit.
New attack dubbed «KnockKnock» because attackers «knock» on backdoor system accounts to infiltrate entire O365 environments.
Experts have discovered a new way to bypass the protection against Rowhammer attacks, aimed at DRAM-memory.
Nowadays, it is difficult to surprise someone by malicious advertising campaigns, but the experts of Proofpoint have discovered a new trend in this area. Now attackers are targeting not on the users ‘ browsers and in their routers.