Securing cloud providers’ SSO
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
3142 articles
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
Episode 329 of the Kaspersky podcast includes AI, Stuxnet and X accounts being flogged on the dark-web.
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Cybersecurity trends to consider and new threats to protect against in 2024.
From the alarming rise of AI-powered cyberthreats to the often-overlooked human factor, discover how the interplay of technology and human behaviour shapes the future of cyber-defence in India.
Detailed analysis of Operation Triangulation, the most sophisticated attack our experts have ever seen, presented at 37C3 conference.
A serious vulnerability in UEFI firmware relevant to a large number of modern computers, and even servers.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
Can’t get to the stores in time to buy gifts for friends and family? Go digital!
Researchers used a hardware hack to bypass Windows Hello biometric authentication on three different devices. Can you trust this login method?
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
Episode 328 of the Kaspersky podcast includes historic EU A.I regulation deal, Evil ChatGPT? and even more A.I!
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Episode 327of the Kaspersky podcast looks at hackers targeting travellers, UK government stiffens adult content laws & an interview with Vidit Gujrathi, chess Grand Master on technology and chess.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.