
Checking QR codes in emails
We’ve added technology that checks QR codes in emails for phishing links.
1325 articles
We’ve added technology that checks QR codes in emails for phishing links.
What information does an MDR service need to protect a company from complex targeted attacks?
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
A step-by-step guide to scanning disk arrays weighing tens of terabytes with the aid of Kaspersky products.
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
Just a few hours before 2025, we recorded a surge in cryptominer distribution through video games. Interestingly, not only home PCs but also corporate machines were affected.
What benefits do hybrid clouds and containerization bring to businesses — and what measurable impact do cybersecurity tools make?
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
Researchers have discovered a vulnerability in the 7-Zip file archiver software.
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
European researchers have discovered a vulnerability in AMD processors that can be exploited by modifying RAM modules.
How to estimate what and how much hardware will be needed for a SIEM system to assess the costs before deployment?
Kaspersky specialists, in collaboration with external experts, have formulated some key guidelines for safe and legal use of AI.
Cybercriminals distributing the Mamont banker under the guise of an application for tracking the delivery of goods at wholesale prices.
How a simple, well-known general threat became a key targeted-attack vector on companies.