Discover the types of malware in 2025, from backdoors to ransomware, and learn which families hackers use most in real-world attacks.
New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project last year.
While Microsoft has strengthened Windows security over the years, cyber threats have also evolved and become more sophisticated. A single misstep can compromise your PC, allowing malware to operate ...
Hackers have been spotted using SEO poisoning and search engine advertisements to promote fake Microsoft Teams installers ...
A teenage programmer (Ada) learns the importance of of being safe online with her friend Computer Head. Suitable for teaching at KS3, KS4 and National 4 and 5.
In the beginning, North Korean hackers compromised the banking infrastructure running AIX, IBM’s proprietary version of Unix. Next, they hacked infrastructure running Windows. Now, the state-backed ...
A group known as UAC-0245 launched a new campaign late last month targeting the Ukrainian government and defense organizations by using XLL files ...
An estimated 100 million Apple users are at risk of falling victim to malware. Cybersecurity software company Check Point issued an urgent warning to the millions of Mac users around the world who may ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果