
The hidden costs of free SIEM
While open-source projects let you build almost any infosec solution, it’s crucial to realistically assess your team’s resources and the time it would take to achieve your goals.
448 articles
While open-source projects let you build almost any infosec solution, it’s crucial to realistically assess your team’s resources and the time it would take to achieve your goals.
Ever wondered why kids these days spend so much time online? Most parents do. So we found out what they’re actually doing there (spoiler: nothing bad).
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
How organizations implement zero-trust principles, and what CISOs advise for project success.
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
We explain where and how to view porn without risking the security of your devices or your wallet.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
How to counter new privacy invasions by browser developers
Takeaways for regular crypto holders from the biggest crypto heist in history.
What information does an MDR service need to protect a company from complex targeted attacks?
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
We break down the most covert mechanism of smartphone surveillance using real-life examples.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
It feels as if spam is as old as the internet itself. The post looks at the money-making scams devised over the years, and how to avoid them today.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
Every file, video, etc. we share contains a lot of hidden additional information — metadata. What’s it for, and is it really necessary?