How to recognize a deepfake: attack of the clones
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
3112 articles
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
Kaspersky SIEM got a set of correlation rules for detecting attempts to exploit vulnerabilities for authentication bypass in Fortinet products.
Why is it useful to attribute malware to a specific hacker group?
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
Children’s AI toys have been caught discussing drugs and sex with kids. We break down the results of a study that reveals exactly how these smart (too smart!) toys are blowing up past boundaries.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
Researchers have discovered that styling prompts as poetry can significantly undermine the effectiveness of language models’ safety guardrails.
Breaking down the WhisperPair attack, which allows victims to be tracked via ordinary Bluetooth headphones.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
Generative AI has taken sextortion techniques to a whole new level — now, any social media user can become a victim. How can you protect yourself and your loved ones?
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
Eight digital New Year’s resolutions you absolutely need to keep.
We’ve identified a new infostealer named Stealka, which masquerades as pirated software and game mods. It targets data stored inside browsers, locally installed applications, and crypto wallets.
GReAT experts have analyzed a new targeted campaign by the ForumTroll APT group.
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
We follow the trail of a phishing attack to break down, step-by-step, what happens to the data stolen from users.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
How automation turns legitimate tools into a channel for malware delivery.