The developers of a run-of-the-mill Python module recently found out why old unpatched vulnerabilities can be dangerous.
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Are you sure your former colleagues don’t have access to corporate data or systems?
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
We explain how the Harly Trojan subscriber targets Android users.
Introducing our new Transparency Center format and the opening of two more facilities in Europe.
Kaspersky Endpoint Detection and Response Optimum – superior enterprise-cybersecurity, with no fluff.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
An unusual case of an attack executed by weaponizing legit video game code.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Highlights from “The nature of cyber incidents” report by the Kaspersky GERT team.
How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.
How a threat-intelligence platform helps SOC analysts.
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
SE Labs awarded Kaspersky EDR its highest rating in independent tests based on real world attacks.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The APKPure app store has been infected by a malicious module that downloads Trojans to Android devices.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
How things are privacy-wise on the social network Poparazzi.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
How to remove browser ads in two clicks using our Anti-Banner feature.