Category: EN

How to Effectively Handle Mobile Device Cyber Risks

In today’s digital landscape, mobile devices have become integral to both personal and professional life. However, their widespread use also brings significant cyber risks. Here are some effective strategies to mitigate these risks and protect your sensitive information. 1. Implement…

4 Frightening Things Coming for Security this Season

As we strive to “Secure Our World” this Cybersecurity Awareness Month, a few irrepressible haunts keep rearing their ugly heads. Here are some of the most malicious monsters hiding under our proverbial cybersecurity beds and what we need to know…

The quantum dilemma: Game-changer or game-ender

If someone told you five years ago that you could pose questions to an AI agent about the most vexing issues in science and it could answer back swiftly and meaningfully, you would’ve thought they were joking. But AI has…

CISOs’ strategies for managing a growing attack surface

In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation. Carlsson highlights the challenges CISOs face today, including maintaining visibility and managing compliance…

AsyncRAT Malware Exploits Bitbucket to Launch Multi-Stage Attack

  G DATA Security Lab has discovered a sophisticated malware operation that used Bitbucket, a popular code hosting platform, to propagate AsyncRAT, a well-known remote access trojan.  According to the study, the attackers employed a multi-stage assault strategy, exploiting Bitbucket…