The practical value of cyberthreat attribution
Why is it useful to attribute malware to a specific hacker group?
Why is it useful to attribute malware to a specific hacker group?
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
Children’s AI toys have been caught discussing drugs and sex with kids. We break down the results of a study that reveals exactly how these smart (too smart!) toys are blowing up past boundaries.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
Researchers have discovered that styling prompts as poetry can significantly undermine the effectiveness of language models’ safety guardrails.
Breaking down the WhisperPair attack, which allows victims to be tracked via ordinary Bluetooth headphones.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Generative AI has taken sextortion techniques to a whole new level — now, any social media user can become a victim. How can you protect yourself and your loved ones?
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
Eight digital New Year’s resolutions you absolutely need to keep.
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.