How attackers adapt to built-in macOS protection ​

How attackers adapt to built-in macOS protection ​

Read More  If a system is popular with users, you can bet it’s just as popular with cybercriminals. Although Windows still dominates, second place belongs to macOS. And this makes it a viable target for attackers. With various built-in protection mechanisms, macOS...
Exploits and vulnerabilities in Q2 2025 ​

Exploits and vulnerabilities in Q2 2025 ​

Read More  Vulnerability registrations in Q2 2025 proved to be quite dynamic. Vulnerabilities that were published impact the security of nearly every computer subsystem: UEFI, drivers, operating systems, browsers, as well as user and web applications. Based on our...
Modern vehicle cybersecurity trends ​

Modern vehicle cybersecurity trends ​

Read More  Modern vehicles are transforming into full-fledged digital devices that offer a multitude of features, from common smartphone-like conveniences to complex intelligent systems and services designed to keep everyone on the road safe. However, this...
GodRAT – New RAT targeting financial institutions ​

GodRAT – New RAT targeting financial institutions ​

Read More  Summary In September 2024, we detected malicious activity targeting financial (trading and brokerage) firms through the distribution of malicious .scr (screen saver) files disguised as financial documents via Skype messenger. The threat actor deployed a...