KeyTrap: how to break a DNS server with a single packet
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
2779 articles
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
AI tools can be seen everywhere — from operating systems and office suites to image editors and chats. How do you use ChatGPT, Gemini, and the many add-ons to these without jeopardizing your digital security?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
Online dating is great for those looking for love – but beware the risks!
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
A vulnerability in the glibc library affects most major Linux distributions.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
Facebook now collects your link history and uses it to show targeted ads. Here’s how to disable this “handy” feature.
Ethical hackers told 37C3 how they found a few eye-openers while breaking DRM to fix trains.
AV-Comparatives has named our new Kaspersky Standard as Product of the Year. This is the highest honor conferred by this renowned independent lab specializing in testing security solutions.
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.