Deep analysis of modern ransomware allows you to implement universal methods to counter them.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Meet Valter Generoso, Technical Account Manager at Kaspersky Latin America.
Our experts studied the shadow market for initial access to corporate infrastructure.
We explain how to best secure your Vivino profile.
Kaspersky Managed Detection and Response experts identified the adversarial techniques that were most prevalent cybersecurity incidents in 2021.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
Dangerous vulnerability was discovered in Dark Souls III videogame that can be used to gain control of a gamer’s computer.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
We found more Minecraft modpacks and a file recovery utility available in Google Play concealing malicious adware.
Gut-wrenching stories of in-game cheating told by actual participants.
Our experts studied the WinDealer malware created by the LuoYu APT group.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
What should an incident response specialist be able to do and how can they improve their skills?
The Department of Homeland Security is urging US federal agencies to “patch or remove” a list of VMware products within five days. Probably you should do it too.
For Anti-Ransomware Day, we decided to publish few tips that will help your company avoid falling victim to ransomware for a second time.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
The APKPure app store has been infected by a malicious module that downloads Trojans to Android devices.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
Our technologies detected targeted attacks involving a number of zero-day exploits.
Scammers are distributing malware and adware made to look like Windows 11.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
How to remove browser ads in two clicks using our Anti-Banner feature.
Tips on security and productivity for those who work both from home and in an office.
How scammers use voice calls for phishing.