391 posts
Wi-Fi alert: The evil twins of access points
Even Wi-Fi access points that are seemingly secure may not be the access points we are trying to connect to. This is the case with evil twins.
PandaLabs presents its cybersecurity predictions for 2019
2017 was the year when the word ransomware stopped being a term exclusive to cybersecurity experts and IT departments. The enormous media attention that attacks…
How to Identify a Business Email Compromise Attack
Business email compromise attacks have skyrocketed over the last few years. Hackers use this strategy to target corporate or publicly available email accounts of executives…
Cyber-criminals invent a new “no talk” scam to trick you
Traditional phone scams involve someone trying to talk you into handing over passwords – but that’s just changed
What is Threat Hunting and why is it necessary?
Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk.…
Marketers develop a new sneaky tracking technique
Digital marketers are desperate to know everything they can about you – and they’re tracking your phone to do it.
The boom of fileless malware attacks: How can we fight it?
Fileless malware is when the malware in question doesn’t get onto our computers through a specific document, but rather is installed within the RAM.