Cisco has presented a report on the study of user privacy during the pandemic.
Neural networks will help users choose stronger passwords
The hacker group has donated part of the ransom it received from its victims to charities.
The DDoS attack power reached 2.54 TB / s - 0.24 TB / s more than the previous record.
The vulnerability could be exploited by sending an HTTP request using a custom protocol handler.
US Cyber Command strongly recommends that you install a patch for the Bad Neighbor vulnerability.
Vulnerabilities can be exploited to run arbitrary code or access confidential information.
The court upheld Microsoft's complaint about harm to its brands and allowed it to seize control of Trickbot's servers.
Experts provided a detailed description of all stages of the attack using the ransomware Ryuk.
TA505, aka Evil Corp, uses fake software updates in its attacks.
The software manufacturer suffered from the Clop ransomware attack.
An unsecured public network is an attractive target for cybercriminals.
The most common ransomware in recent months have been Maze, Ryuk and REvil.