
686 articles
Our technologies have helped to detect the zero-day vulnerability CVE-2025-2783 in Google Chrome, which was used in a sophisticated APT attack.
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
How to respond to a compromised GitHub changed-files Action incident.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
Microsoft’s March Patch Tuesday fixes several vulnerabilities that have already been used in the wild. Details are not clear at the moment, but it’s worth installing the patches ASAP.
We’ve added technology that checks QR codes in emails for phishing links.
What information does an MDR service need to protect a company from complex targeted attacks?
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
A step-by-step guide to scanning disk arrays weighing tens of terabytes with the aid of Kaspersky products.
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
Just a few hours before 2025, we recorded a surge in cryptominer distribution through video games. Interestingly, not only home PCs but also corporate machines were affected.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
Researchers have discovered a vulnerability in the 7-Zip file archiver software.
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
How to estimate what and how much hardware will be needed for a SIEM system to assess the costs before deployment?