Detecting account compromise with SIEM
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
3517 articles
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
Children’s AI toys have been caught discussing drugs and sex with kids. We break down the results of a study that reveals exactly how these smart (too smart!) toys are blowing up past boundaries.
NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
Researchers have discovered that styling prompts as poetry can significantly undermine the effectiveness of language models’ safety guardrails.
Our Android apps are no longer available on Google Play. We explain how to download, install, and update them by alternative means.
Breaking down the WhisperPair attack, which allows victims to be tracked via ordinary Bluetooth headphones.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
Generative AI has taken sextortion techniques to a whole new level — now, any social media user can become a victim. How can you protect yourself and your loved ones?
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
Seven digital New Year’s resolutions you absolutely need to keep.
We’ve identified a new infostealer named Stealka, which masquerades as pirated software and game mods. It targets data stored inside browsers, locally installed applications, and crypto wallets.
GReAT experts have analyzed a new targeted campaign by the ForumTroll APT group.
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
We follow the trail of a phishing attack to break down, step-by-step, what happens to the data stolen from users.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
How automation turns legitimate tools into a channel for malware delivery.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.