Kaspersky AI Technology Research Center: who we are and what we do
Our developments, products, research, patents and expert teams harnessed for AI.
683 articles
Our developments, products, research, patents and expert teams harnessed for AI.
Autumn is here, kids are going back to school and also meeting up with friends in their favorite online games. With that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most likely to encounter.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Going on vacation? We’ve compiled a traveler’s guide to help you have an enjoyable safe time and completely get away from the routine.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
“Gentle grafters” are attacking dishonest crypto users by imitating wallet leaks and manipulating their victims for months.
Kaspersky experts examined the security of public Wi-Fi hotspots in Paris on the eve of the Olympics.
Scammers prepared carefully for this very sporty summer. First they targeted soccer fans during the Euros; now they’re setting their sights on spectators at the Paris 2024 Olympics. How can you stay safe from scams during the Games?
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
The updated VPN & Antivirus by Kaspersky for iOS now supports Apple Shortcuts and Siri. We explain what you can do with this feature, and how to set it up.
Tips on how to watch the UEFA Euro 2024 tournament while keeping your money safe and your mood good.
Two-factor authentication protects your account from theft — until you yourself give away your one-time password.
Threat actors are targeting hotel staff with malicious and phishing e-mails.
Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!
Episode 346 of the Kaspersky Podcast takes a look at North Korean propaganda sweeping TikTok, Nudify app and more.
Can you catch malware by downloading files from Microsoft’s repositories on GitHub? Turns out, you can. Stay alert!
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?