People are bad at passwords. Most don’t bother with the unique, complex phrases or character strings that make a good password. Worse, they share weak passwords with others. The best password managers ...
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Transparent Tribe uses AI tools to mass-produce polyglot malware targeting India using Slack, Discord, and Google Sheets C2.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations.
Using a VPN, or virtual private network, is one of the best ways to protect your online privacy. We review dozens every year, and these are the top VPNs we've tested. I’ve been writing about ...