
Detecting DLL hijacking
Our experts trained an ML model to detect attempts to use DLL hijacking, and integrated it into the Kaspersky SIEM system.
Our experts trained an ML model to detect attempts to use DLL hijacking, and integrated it into the Kaspersky SIEM system.
Phoenix, a new variant of the Rowhammer attack, makes it possible to attack DDR5 memory modules.
We discovered a new wave of attacks on WhatsApp users in which attackers steal victims’ accounts using fake voting pages and social engineering on social networks.
Using our Kaspersky Next product line as an example, we explain the practical differences between XDR Optimum and EDR Optimum.
Which path of cybersecurity team evolution best suits your company’s strategy?
The Kaspersky for Android app can now detect malicious links in notifications from any app.
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
This is a tale about how vulnerabilities in apps by intimate-toy maker Lovense exposed users’ identities and allowed for account takeovers — a problem the company ignored for years.
A fresh research paper shows how complex vulnerabilities in CPUs can be leveraged in the most pertinent attacks on cloud-based systems.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky