New VoidStealer Trojan bypasses Chrome’s stored data protection
The new VoidStealer Trojan utilizes a novel method to bypass Chrome’s App-Bound Encryption, allowing it to hijack sessions and steal user data.
68 articles
The new VoidStealer Trojan utilizes a novel method to bypass Chrome’s App-Bound Encryption, allowing it to hijack sessions and steal user data.
We’ve identified a new infostealer named Stealka, which masquerades as pirated software and game mods. It targets data stored inside browsers, locally installed applications, and crypto wallets.
Windows Downdate is an attack that can roll back updates to your OS to reintroduce vulnerabilities and allow attackers to take full control of your system. How to mitigate the risk?
The story of how CrowdStrike released an update on a Friday and brought down thousands, tens of thousands, or maybe even hundreds of thousands of computers around the world.
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Four handy ways to lock your screen on Windows and macOS.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Why the Windows system time can suddenly change, and how to stop it from happening.
Some thoughts on what PC software patches should be prioritized and why.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
It means that some companies still have not installed MS Office patches that were published 5 years ago.
Minecraft mods downloaded from several popular gaming websites contain dangerous malware. What we know so far.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
Cybercriminals are attacking 3CX VoIP telephony software users via trojanized applications.