What to do if your Telegram account is hacked
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
3311 articles
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
What IT and cybersecurity leaders need to know about implementing network detection and response.
Detection of tactics involving malicious DLL registration and other Kaspersky SIEM improvements in Q4 2024.
Is a taped-over webcam or phonecam a sign of paranoia – or smart thinking?
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
Scammers posing as buyers snatch one-time codes during online product demos.
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
The patch that fixes CVE-2024-49040 in Microsoft Exchange is temporarily unavailable. We’ve implemented heuristics that detect attempts to exploit it.
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
A vulnerability that permits bypassing authentication has been found in a popular security hardening plugin for WordPress.
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
Analyzing incidents and drawing lessons from them should be an integral part of the incident response process. This can help improve the overall security level of a company.
Web pages often disappear, move, or change content. How to keep them the way you want, or easily locate a web archive?
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.