
Cybersecurity talent shortages: the roots and the solutions
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
3930 articles
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
Episode 364 has Tamagotchi’s, is TOR broken and crazy robot shenanigans!
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
We’ve discovered a new Trojan that’s very selective about its victims.
Our developments, products, research, patents and expert teams harnessed for AI.
Episode 363 has brain rot, stolen mobiles in China and streaming fraud!
An Office 365 security alert as bait in a phishing email.
Autumn is here, kids are going back to school and also meeting up with friends in their favorite online games. With that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most likely to encounter.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
Why and how to create a local backup of cloud data, taking Notion as an example.
Even in 2024, the world is rife with digital paranoia and superstition. Is my smartphone tracking me? Will incognito mode make me invisible? This post answers these and lots of other related questions.
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
A paper from Uruguayan scientists lays out a highly technical and impractical method of spying on computer monitors.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
Episode 360 looks at fake Taylor Swift, Nvidia woes, TV ads and much more!