Why infostealers are a threat to big business
How a simple, well-known general threat became a key targeted-attack vector on companies.
448 articles
How a simple, well-known general threat became a key targeted-attack vector on companies.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
AI is disrupting security strategies, creating risks alongside opportunities to build more adaptive, effective protection – leaving InfoSec professionals increasingly concerned.
Our developments, products, research, patents and expert teams harnessed for AI.
“Gentle grafters” are attacking dishonest crypto users by imitating wallet leaks and manipulating their victims for months.
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
How to protect your company from mail bombs and other unwanted correspondence using personalized content filtering
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Cybersecurity trends to consider and new threats to protect against in 2024.
Episode 328 of the Kaspersky podcast includes historic EU A.I regulation deal, Evil ChatGPT? and even more A.I!
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?