Why AI agents need an iron curtain
Researcher Niels Provos’ prototype IronCurtain architecture: a system designed to restrict the actions of AI agents through isolation and security policies.
970 articles
Researcher Niels Provos’ prototype IronCurtain architecture: a system designed to restrict the actions of AI agents through isolation and security policies.
In 2025, just as in the year prior, supply-chain attacks remained one of the most severe threats facing organizations. We’re breaking down last year’s most noteworthy incidents.
Spammers have figured out how to hide links to fraudulent sites within surveys created on legitimate platforms. We’re breaking down the ruse and sharing tips on how to avoid falling for it.
Threat actors are promoting pages containing malicious instructions for installing AI agents intended for workflow automation.
We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone.
Educational institutions are increasingly falling victim to ransomware attacks. We look at some real-world incidents, explain their causes, and discuss how to mitigate risks to academic infrastructure.
Tired of hallucinations in AI overviews, and have no clue as to why or how Copilot suddenly appeared on your PC? Here’s a guide to switching off those intrusive AI features in popular services.
A browser-in-the-browser attack, theoretically described in 2022, has been adopted in real-world phishing. We break down how it works, and how to spot a fake authentication window.
Why do we have a love-hate relationship with dating apps, and what are they doing to our brains? Can an emoji start a war? Is marrying an AI actually a thing? We’re exploring how modern tech is redefining love and our very ideas of it.
We’re breaking down how to protect yourself from fake streams, counterfeit tickets, and non-existent merch — and how to keep your personal and financial data from being snatched during the 2026 Winter Olympic Games.
Breaking down core cybersecurity terms that colleagues often interpret differently or incorrectly.
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
Eight digital New Year’s resolutions you absolutely need to keep.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.