653 articles
Researchers found critical vulnerability in Spring, a popular Java framework. Here’s how it works, why it’s dangerous and how to protect from it.
Hackers from Lapsus$ group claim they breached Okta, a major provider of access management systems.
HermeticRansom cryptor was used as a distraction to support HermeticWiper attacks.
Anti-phishing lessons: what company employees should know about fake notifications about account security.
How threat intelligence helps prevent cyberattacks on enterprises.
Methods of reasonable protection against potential freelancer related cyberthreats.
Does hardware vulnerabilities in CPU pose a practical threat to businesses?
Kaspersky have a new service that allows our threat intelligence customers to take down malicious and phishing sites.
Our experts have discovered a malicious campaign targeting fintech companies.
Microsoft patches more than a 100 vulnerabilities in Windows 10 and 11, Windows Server 2019 and 2022, Exchange Server, Office, and Edge browser.
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
Our Danish colleague spilled a lot of cybersecurity ink in his works.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
A look at what’s changed in the Matrix in the 18 years since the last update.
A cyberattack has affected an unexpectedly large number of industrial systems.
Even to the naked eye, the Matrix’s flawed implementation threatens the system’s stability and security.