Ransomware now taking aim at personal backups
Personal backups and home NAS are now in cybercriminals’ crosshairs. We break down exactly how hackers encrypt your data — and how you can stop them.
777 articles
Personal backups and home NAS are now in cybercriminals’ crosshairs. We break down exactly how hackers encrypt your data — and how you can stop them.
Researcher Niels Provos’ prototype IronCurtain architecture: a system designed to restrict the actions of AI agents through isolation and security policies.
In 2025, just as in the year prior, supply-chain attacks remained one of the most severe threats facing organizations. We’re breaking down last year’s most noteworthy incidents.
How open-source security solutions became the starting point for a massive attack on other popular applications, and what organizations that use them should do.
Cybercriminals are now deploying web applications generated by Bubble, an AI-powered app builder, to hunt for corporate credentials.
We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone.
Educational institutions are increasingly falling victim to ransomware attacks. We look at some real-world incidents, explain their causes, and discuss how to mitigate risks to academic infrastructure.
The latest update to Kaspersky Cloud Workload Security adds support for an AI assistant for image analysis.
What corporate security teams should do about the “viral” AI agent.
Today we’re diving into the OpenClaw AI agent — formerly known as “Clawdbot” and then “Moltbot” — to prove once again that secure AI is still a long way off.
Breaking down core cybersecurity terms that colleagues often interpret differently or incorrectly.
Children’s AI toys have been caught discussing drugs and sex with kids. We break down the results of a study that reveals exactly how these smart (too smart!) toys are blowing up past boundaries.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
Eight digital New Year’s resolutions you absolutely need to keep.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
How automation turns legitimate tools into a channel for malware delivery.
Millions of websites based on React and Next.js contain an easy-to-exploit vulnerability that can lead to complete server takeover. How to check if your server is vulnerable, and protect corporate web assets?
Researchers have discovered how to connect to someone else’s dashcam in a matter of seconds, and weaponize it for future attacks.
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.