How spammers exploit hijacked corporate domains
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
3273 articles
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
Episode 344 of the Kaspersky podcast looks at Meta AI blunders, Grindr in the docks & do 5-year olds’ need mobile phones?
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
How to protect your company from mail bombs and other unwanted correspondence using personalized content filtering
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Episode 343 of the Kaspersky podcast has ransomware extortion via call centers, X controversy & more!
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
Episode 342 of the Kaspersky podcast focuses on politics, AI meddling, YouTube and a governmental honey trap.
How to tell a real photo or video from a fake, and trace its provenance.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
Episode 341 of the Kaspersky podcast has nueral implants, Google review chase, data broker exposure and more.
What influences individuals’ behaviours toward cybersecurity issues – particularly regarding connecting to a secure internet connection, handling suspicious links and files, and adopting strong passwords?
Hackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more recently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down what happened and how it could have been avoided.
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
A backdoor implanted into XZ Utils has found its way into popular Linux distributions.
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
Got a message from your boss or coworker asking you to “fix a problem” in an unexpected way? Beware of scammers! How to protect yourself and your company against a potential attack.