3201 articles
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
How a fake restart helps malware to gain a foothold in a smartphone’s operating system without exploiting a persistence vulnerability.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
This week on the Kaspersky podcast, Ahmed and Dave discuss malware targeting nonofficial Telegram downloads, cryptominers infesting illegal downloads of Spiderman No Way Home, and more.
Remembering 2021’s most interesting infosec events — in memes and tweets.
Our Danish colleague spilled a lot of cybersecurity ink in his works.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
Living in the digital age has many perks, but every time we go online we leave a trail – is now the time we ask for the right to be forgotten?
A look at what’s changed in the Matrix in the 18 years since the last update.
A cyberattack has affected an unexpectedly large number of industrial systems.
Even to the naked eye, the Matrix’s flawed implementation threatens the system’s stability and security.
This week on the Kaspersky podcast, Dave and Jeff discuss how a fat-fingered mistake cost an NFT owner a lot of money, Instagram improvements for teens, Log4J, and more.
The malicious Internet Information Services module makes Outlook on the web a cybercriminal tool.
Kaspersky opens its fifth Transparency Center, our first in North America, in Fredericton, New Brunswick, Canada.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
A practical guide for chief information security officers and security operation center managers.
This week on the Kaspersky podcast, Ahmed, David, and Jeff discuss the $450K cost of being Snoop Dogg’s virtual neighbor, disinformation on social networks, Omicron variant phishing, and more.
Kaspersky IoT Secure Gateway 100: How to protect industrial data whilst preserving business continuity.