Patching strategies in corporate infrastructure
How to distribute patches on company computers without causing disruptions.
106 articles
How to distribute patches on company computers without causing disruptions.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.
Blocking a threat isn’t enough; you have to understand and reconstruct the whole infection chain.
A zero-day vulnerability in Microsoft Windows may already have been exploited.
Unknown attackers tried to add a backdoor to PHP scripting language source code.
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.
RTM group attacks victims with ransomware, a banking Trojan, and remote-access tools.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
When the creators of Fonix ransomware abandoned their malicious ways and published the master key, we made a decryptor out of it.
Version 14.4 patches vulnerabilities that cybercriminals are actively exploiting. Install this update as soon as possible.
Hell hath no fury. A former medical device supplier sabotages deliveries to customers.
No one should be using the dead technology, and any websites that still use it need an update.
“Zyfwp,” an admin-level account with a hard-coded password, discovered in several networking devices made by ZyXel.
Someone tried to use popular Google Chrome Extensions for secretly playing videos in users’ browsers to inflate view counts.