Stay updated with the latest cybersecurity news.

shutterstock_720388555

Dealing with JavaScript obfuscations – Part 2

Mon Jun 01 2020

In part one, we learned about Javascript as a malware and we started to understand…

shutterstock_1463449130

Dealing with JavaScript obfuscations – Part 1

Wed May 27 2020

Using JavaScript in cyber attacks is not exactly new, but more and more attackers are…

shutterstock_1369501685

Undetect me if you can

Thu May 21 2020

A new variant of the raccoon malware to steal user data from browsers.  The one…

shutterstock_1606120399

“Tell me about yourself”: Conducting job interviews from home

Thu May 21 2020

Let’s be honest. The novelty of working from home has worn off. People, communities, and…

shutterstock_1124997365

Multistage malware breakdown – Part 2

Sun May 17 2020

In the last part, we started analyzing an HTA file, which revealed a Powershell script…

shutterstock_1166453734

Multistage malware breakdown – Part 3

Sun May 17 2020

The Ads.jpg analysis So after extracting the information from the VBScript, we saw a download…

shutterstock_680078896

Multistage malware breakdown – Part 1

Wed May 13 2020

Nowadays, malware is more sophisticated due to the use of obfuscation techniques. The goal of…

shutterstock_165539555

Get some ‘quarantime’ with your kids

Mon May 11 2020

Unprecedented, unusual, unwanted; shelter-in-place life is all that and more. Yet, according to medical experts,…

shutterstock_1691557579

COVID-19: Keeping internal work teams up to speed

Mon May 11 2020

Being a leader of remote work teams is many things, but easy isn’t one of…

shutterstock_1070995814

Can the Internet handle all the traffic while everyone works from home?

Mon Apr 13 2020

Since the COVID-19 pandemic thrust the world into shelter-in-place mode, more people are relying on…