Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter…

Security researcher Bosko Stankovic recently published an article explaining how an attacker could use Chrome, the SMB file sharing protocol, and…

Last week was dominated by the WannaCry ransomware and the discussions ensuing it. We published: Others discussed:In other news we celebrated…

Early this April, an increase of infection rates by a variant of ransomware known as Android/Ransom.SLocker.fh was seen. Ransomware targets Tencent usersAn…

There are several different types of malware that look for interesting information on an infected computer and transmit that information to…

The Asia Pacific Privacy Authorities (APPA) began an initiative called Privacy Awareness Week, or PAW, with the purpose of educating users…

Whether you call it WannaCry, WannaCrypt, WCrypt, Wanacrypt0r, WCry, or one of the other names currently vying for the “call me…

Something that many security researchers have feared has indeed come true. Threat actors have integrated a critical exploit taking advantage of…

UPDATE (as of 5/18/17): UPDATE (as of 5/17/17):Reports of two massive, global ransomware attacks are dominating the news. As workers in…

There is yet another ransomware on the block, but contrary to the many copycats out there this one appears to be…