Trending Now
Featured news
The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell...
Overview of the attacks
In mid-2025, we identified a malicious driver file on computer systems in Asia. The driver file is signed with an old,...
Tech News
Tech
Threat Actors Using Fake Claude Code Download to Deploy Infostealer
Cybercriminals have found a new way to target developers and IT professionals by setting up fake download pages that impersonate Claude Code, a legitimate...
Security
Fraud Scenarios in the Buy Now, Pay Later Ecosystem
Existing fraud tricks are finding new use in buy now, pay later payment systems. - Read more
Most popular
Interpol’s ‘Operation Synergia III’ Nets 94 Arrests in Major Cybercrime Sweep
A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses - Read more
[Case Study] Securing Your Data In The Cloud
Tripwire, Inc.
How do file partner programs work?
It’s easy to notice if you’ve fallen victim to an advertising partner program: the system has new apps that you didn’t install, ad pages...
GreyEnergy’s overlap with Zebrocy
In October 2018, ESET published a report describing a set of activity they called GreyEnergy, which is believed to be a successor to BlackEnergy...









![[Case Study] Securing Your Data In The Cloud](https://www.dataproof.co.za/wp-content/uploads/2019/04/case-study-securing-your-data-in-the-cloud-150x70.jpg)










