Kaspersky AI Technology Research Center: who we are and what we do
Our developments, products, research, patents and expert teams harnessed for AI.
1136 articles
Our developments, products, research, patents and expert teams harnessed for AI.
An Office 365 security alert as bait in a phishing email.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
A paper from Uruguayan scientists lays out a highly technical and impractical method of spying on computer monitors.
Windows Downdate is an attack that can roll back updates to your OS to reintroduce vulnerabilities and allow attackers to take full control of your system. How to mitigate the risk?
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The story of how CrowdStrike released an update on a Friday and brought down thousands, tens of thousands, or maybe even hundreds of thousands of computers around the world.
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
Medium-sized businesses increasingly find themselves on the receiving end of targeted attacks. What tools does one need when basic security proves inadequate?
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
The JavaScript CDN service Polyfill.io has started spreading malicious code. Remove the service’s script from your website.
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
The updated EU Network and Information Security Directive (NIS 2) came into force in January 2023. Member states have until October 17, 2024, to transpose it into national law. What does this mean, and how to prepare for it?
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
Our experts have discovered ransomware they’ve dubbed “ShrinkLocker”, which encrypts infected computers’ drives using BitLocker — a utility built into Windows.
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
Threat actors are targeting hotel staff with malicious and phishing e-mails.