The Importance of Network Visibility With a Remote Workforce
We are now living in challenging times due to the COVID-19 outbreak as we work from home, self-isolate, and protect...
We are now living in challenging times due to the COVID-19 outbreak as we work from home, self-isolate, and protect...
Since February, a prominent Magecart cybercriminal group has injected the same Java-based payment card skimmer program not one, not two,...
Another malicious actor has weaponized an otherwise legitimate, interactive coronavirus tracking map created by Johns Hopkins University — this time...
The number of scams, threats, and malware campaigns taking advantage of public concern over the coronavirus is increasing each day....
Nefilim, a new malicious program that basically is ransomware that functions by encrypting files on affected systems, has become active...
For the past few years, we have been spreading our knowledge and experience of using YARA, often called a pattern...
Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef....
As far as I know, sshuttle is the only program that solves the following common case:Your client machine (or router)...
Right now, we are all dealing with uncertain times, given the COVID-19 pandemic. The organizations we work for are depending...
Researchers have uncovered a new malware campaign that uses the COVID-19 pandemic as a lure, and also abuses platform-as-a-service web...
In a world where children as young as a single day old can fall prey to fraud, it is more...
IT specialists of the Slovak company ESET warn of a new series of attacks committed by the Turla cyber-spy group,...
There is no denying the fact that the rise of COVID-19 has taken the world by storm yet it’s very...
Dear social media mongers, amidst all the talk about the Coronavirus and keeping your body’s health in check, your digital...
Amid the Coronavirus (COVID-19) panic, numerous corporates and organizations have told their employees to work from home as a safety...
In an attempt to block misinformation from being spread by developers taking advantage of the COVID-19 charged environment, Google started...
A simple terminal UI for both docker and docker-compose, written in Go with the gocui library.Minor rant incoming: Something's not...
Mimikatz implementation in pure Python. At least a part of it :)Runs on all OS's which support python>=3.6 WIKISince version...
Could your team be wasting its time reporting vulnerability metrics that don’t matter? Security teams often fall into the trap...
Each day, as the novel coronavirus multiplies and spreads, so do cyber scams capitalizing on users’ fears and thirst for...
Members of the IT and cybersecurity communities have successfully obtained a password key for victims of CovidLock Android ransomware, which...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Since the coronavirus became a worldwide health issue, the desire for more information and guidance from government and health authorities...
After the World Health Organization (WHO) officially recognized the outbreak of COVID-2019 as a pandemic, many employers offered their employees...