

Andrada Fiscutean
Andrada Fiscutean is a technology journalist and radio news editor. She writes about hackers, malware, women in tech and companies based in Eastern Europe.


Malware variability explained: Changing behavior for stealth and persistence
More malware is designed to be variable, choosing which computers to infect or even the type of attack to execute.

Why are people so bad at risk assessment? Blame the brain
Stakeholders and CISOs tend to have different perspectives on estimating the risk of a potential cybersecurity incident. Understanding the psychological aspects can help bridge the gap.

How corporate data and secrets leak from GitHub repositories
Attackers constantly search public code repositories like GitHub for secrets developers might inadvertently leave behind, and any tiny mistake can be exploited.

Steganography explained and how to protect against it
Steganography is reasonably easy to implement yet difficult to detect, which is why threat actors use it to deliver malware, evade detection, and gain persistence.

5 best practices for designing application logs
Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.

The most dangerous (and interesting) Microsoft 365 attacks
APT groups are developing new techniques that allow them to avoid detection and exfiltrate hundreds of gigabytes of data from emails, SharePoint, OneDrive, and other applications.

How to control ransomware? International cooperation, disrupting payments are key, experts say
Anti-ransomware acts or regulations will require global cooperation, experts say. In the meantime, ransomware victims should cooperate quickly and fully with authorities.

The 10 most dangerous cyber threat actors
These are the most notorious global cybercriminal and state-sponsored groups according to security researchers.

Hacktivism’s reemergence explained: Data drops and defacements for social justice
A record amount of leaked data to expose far-right groups signals a more focused and serious approach to hacking for a cause. To understand the risk, CISOs should pay attention to the news.

Booming dark web gig economy is a rising threat
Experts seen a sharp increase in help-wanted ads for black hat hackers-for-hire. Here's what they are targeting and how to respond to the threat.

Remote work raises threats from consumer IoT devices
With the rise of working from home, companies need to protect themselves against a wide range of consumer devices, including smart light bulbs.

What is malvertising? When malicious ads attack
Malvertising, the practice of sprinkling malicious code to legitimate-looking ads, affects both small and large websites. Protecting against it is harder than it seems.

Why Excel 4.0 macro exploits are surging
Researchers discover progressively complex and effective XL4 attacks that take advantage of the many organizations that still rely on the old functionality.

From pranks to APTs: How remote access Trojans became a major security threat
A remote access Trojans (RAT) is malicious software that allows an attacker to gain unauthorized access to a victim’s computer over the internet. RATs are typically installed without user consent and remain hidden to avoid detection.

Stretched and stressed: Best practices for protecting security workers' mental health
Security work is stressful under the best of circumstances, but remote work presents its own challenges. Here's how savvy security leaders can best support their teams today — wherever they're working.

A history of ransomware: The motives and methods behind these evolving attacks
Ransomware was a novelty until Bitcoin emerged. Today, ransomware is big business as gangs keep innovating.

Microsoft Office the most targeted platform to carry out attacks
The number of attacks carried out using the popular suite has increased in the past two years as browsers become harder targets. Office files are now more popular than PDFs to deliver malware.

Want better mobile security or privacy? Try these Android and iOS alternatives
GrapheneOS offers hardened security over Android, while /e/OS locks down your private information. The main trade-off for both is fewer apps.

Stealing money in the digital age: The dark industry of trafficking financial data
Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks.