Where did that game cheats video on your YouTube channel come from?
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
1391 articles
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
Episode 266 of the Transatlantic Cable includes TikTok data breaches, Samsung and Meta woes, and doom scrolling!
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Highlights from “The nature of cyber incidents” report by the Kaspersky GERT team.
From an ex-Twitter exec blowing the whistle to Janet Jackson’s song crashing hard drives – it’s episode 265 of the Transatlantic Cable podcast.
Users of the Signal messaging app got hit by a hacker attack. We analyze what happened and why the attack demonstrates that Signal is reliable.
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
Using a recent study on hardware vulnerabilities in processors as an example, we contemplate the cost of security.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
Meet the new Kaspersky: We introduce our new product line and tell you about the improvements our home users can expect.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
Our experts studied the shadow market for initial access to corporate infrastructure.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Here’s how phishers extract phone numbers and credentials from users of Wise.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?