MysterySnail crawls through zero-day vulnerability
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
3895 articles
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
FinSpy spyware targets Android, iOS, macOS, Windows, and Linux users. Here’s what it can do and how to stay protected.
How attackers are most apt to get into target companies’ infrastructure.
This week on the Transatlantic Cable podcast, we look at the recent Facebook outage, how iCloud was used to spy on Britney Spears, and much more.
IT Security Economics 2021 report: Infosec’s top 5 challenges dealing with complex incidents.
The results of AV-TEST’s thorough research on the ability of cybersecurity products to tackle ransomware are shocking and scary.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Testing 11 advanced security solutions against the latest ransomware threats.
In conversation with NTIA, we discuss the organization, where it stands, and what the future holds.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
At the SAS 2021 conference, our experts talked about the Tomiris backdoor, which appears to be linked to the DarkHalo group.
This week on the podcast, Dave, Jeff, and Ahmed talk about Facebook’s Instagram notions, hamsters in cryptocurrency, and more.
Cyberattacks most commonly rely on just a few common operating system components.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss Bitcoin in El Salvador, REvil decryptor, and more.
Here’s how to open a program if your antivirus app blocks it.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.