Latest Articles

RSAC 2025 wrap-up – Week in security with Tony Anscombe

RSAC 2025 wrap-up – Week in security with Tony Anscombe

RSAC 2025 wrap-up – Week in security with Tony Anscombe

From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions

Editor02 May 2025


TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks

TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks

TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks

ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks

Facundo Muñoz30 Apr 2025


This month in security with Tony Anscombe – April 2025 edition

This month in security with Tony Anscombe – April 2025 edition

This month in security with Tony Anscombe – April 2025 edition

From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity

Editor29 Apr 2025


How safe and secure is your iPhone really?

How safe and secure is your iPhone really?

How safe and secure is your iPhone really?

Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.

Phil Muncaster28 Apr 2025


Deepfake 'doctors' take to TikTok to peddle bogus cures

Deepfake 'doctors' take to TikTok to peddle bogus cures

Deepfake 'doctors' take to TikTok to peddle bogus cures

Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements

Martina López and Tomáš Foltýn25 Apr 2025


How fraudsters abuse Google Forms to spread scams

How fraudsters abuse Google Forms to spread scams

How fraudsters abuse Google Forms to spread scams

The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.

Phil Muncaster23 Apr 2025


Will super-smart AI be attacking us anytime soon?

Will super-smart AI be attacking us anytime soon?

Will super-smart AI be attacking us anytime soon?

What practical AI attacks exist today? “More than zero” is the answer – and they’re getting better.

Cameron Camp22 Apr 2025


CapCut copycats are on the prowl

CapCut copycats are on the prowl

CapCut copycats are on the prowl

Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead

Tomáš Foltýn and Christian Ali Bravo17 Apr 2025


They’re coming for your data: What are infostealers and how do I stay safe?

They’re coming for your data: What are infostealers and how do I stay safe?

They’re coming for your data: What are infostealers and how do I stay safe?

Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data

Phil Muncaster16 Apr 2025


Attacks on the education sector are surging: How can cyber-defenders respond?

Attacks on the education sector are surging: How can cyber-defenders respond?

Attacks on the education sector are surging: How can cyber-defenders respond?

Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?

Phil Muncaster14 Apr 2025


Watch out for these traps lurking in search results

Watch out for these traps lurking in search results

Watch out for these traps lurking in search results

Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results

Tomáš Foltýn10 Apr 2025


So your friend has been hacked: Could you be next?

So your friend has been hacked: Could you be next?

So your friend has been hacked: Could you be next?

When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.

Tomáš Foltýn09 Apr 2025


Apt Activity Report
MDR Protection