Risks, vulnerabilities, and zero trust: key terms the CISO and the board must agree on
Breaking down core cybersecurity terms that colleagues often interpret differently or incorrectly.
780 articles
Breaking down core cybersecurity terms that colleagues often interpret differently or incorrectly.
Children’s AI toys have been caught discussing drugs and sex with kids. We break down the results of a study that reveals exactly how these smart (too smart!) toys are blowing up past boundaries.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
Eight digital New Year’s resolutions you absolutely need to keep.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
How automation turns legitimate tools into a channel for malware delivery.
Millions of websites based on React and Next.js contain an easy-to-exploit vulnerability that can lead to complete server takeover. How to check if your server is vulnerable, and protect corporate web assets?
Researchers have discovered how to connect to someone else’s dashcam in a matter of seconds, and weaponize it for future attacks.
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
How organizations save employee time and boost productivity with the new version of Kaspersky SD-WAN.
Two separate research papers vividly demonstrate how virtual systems can be compromised in a hostile environment — specifically, when the data owner can’t even trust the cloud provider.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
Our experts trained an ML model to detect attempts to use DLL hijacking, and integrated it into the Kaspersky SIEM system.
Which path of cybersecurity team evolution best suits your company’s strategy?
Using our Kaspersky Next product line as an example, we explain the practical differences between XDR Optimum and EDR Optimum.
A fresh research paper shows how complex vulnerabilities in CPUs can be leveraged in the most pertinent attacks on cloud-based systems.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
Most employees are already using personal LLM subscriptions for work tasks. How do you balance staying competitive with preventing data leaks?