Ransomware now taking aim at personal backups
Personal backups and home NAS are now in cybercriminals’ crosshairs. We break down exactly how hackers encrypt your data — and how you can stop them.
4246 articles
Personal backups and home NAS are now in cybercriminals’ crosshairs. We break down exactly how hackers encrypt your data — and how you can stop them.
Researcher Niels Provos’ prototype IronCurtain architecture: a system designed to restrict the actions of AI agents through isolation and security policies.
In 2025, just as in the year prior, supply-chain attacks remained one of the most severe threats facing organizations. We’re breaking down last year’s most noteworthy incidents.
Spammers have figured out how to hide links to fraudulent sites within surveys created on legitimate platforms. We’re breaking down the ruse and sharing tips on how to avoid falling for it.
How open-source security solutions became the starting point for a massive attack on other popular applications, and what organizations that use them should do.
Cybercriminals are now deploying web applications generated by Bubble, an AI-powered app builder, to hunt for corporate credentials.
Intellexa’s Predator spyware can hide camera and microphone usage indicators on iOS devices. Here’s a look at how it pulls it off.
In November 2025, the npm ecosystem was hit by a flood of junk packages that were part of the IndonesianFoods malicious campaign. We’re breaking down the lessons learned from this incident.
We break down how AI assistant hallucinations can turn lethal, and explain the fundamental principles you need to follow to avoid becoming an accidental casualty of progress.
Threat actors are promoting pages containing malicious instructions for installing AI agents intended for workflow automation.
We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone.
We’re diving into why mental health apps have become a headache for their users, and how to minimize the risks of medical data leaks.
Educational institutions are increasingly falling victim to ransomware attacks. We look at some real-world incidents, explain their causes, and discuss how to mitigate risks to academic infrastructure.
Tired of hallucinations in AI overviews, and have no clue as to why or how Copilot suddenly appeared on your PC? Here’s a guide to switching off those intrusive AI features in popular services.
A browser-in-the-browser attack, theoretically described in 2022, has been adopted in real-world phishing. We break down how it works, and how to spot a fake authentication window.
The latest update to Kaspersky Cloud Workload Security adds support for an AI assistant for image analysis.
An in-depth analysis of CVE-2026-3102, a vulnerability posing a potential threat to anyone processing images on a Mac.
What is the purpose of a local version of the Kaspersky Threat Attribution Engine, and how to hook it up to IDA Pro?
What corporate security teams should do about the “viral” AI agent.