SLAP and FLOP: Complex vulnerabilities in Apple CPUs
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
1182 articles
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
Cybercriminals distributing the Mamont banker under the guise of an application for tracking the delivery of goods at wholesale prices.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Detection of tactics involving malicious DLL registration and other Kaspersky SIEM improvements in Q4 2024.
Scammers posing as buyers snatch one-time codes during online product demos.
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
AI is disrupting security strategies, creating risks alongside opportunities to build more adaptive, effective protection – leaving InfoSec professionals increasingly concerned.
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign.
Why cybersecurity in education is critical, and how to protect schools from attacks.