NFC skimming attacks
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
Cybercriminals are distributing malware that deploys an infostealer and masks its activity in network and system logs.
Eight digital New Year’s resolutions you absolutely need to keep.
We’ve identified a new infostealer named Stealka, which masquerades as pirated software and game mods. It targets data stored inside browsers, locally installed applications, and crypto wallets.
GReAT experts have analyzed a new targeted campaign by the ForumTroll APT group.
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.
We follow the trail of a phishing attack to break down, step-by-step, what happens to the data stolen from users.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.