Epochalypse Now — or how to deal with Y2K38
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
4089 articles
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
Generative AI has taken sextortion techniques to a whole new level — now, any social media user can become a victim. How can you protect yourself and your loved ones?
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
How criminals exploit the familiar “tap your phone to pay” feature to steal your money.
Eight digital New Year’s resolutions you absolutely need to keep.
We’ve identified a new infostealer named Stealka, which masquerades as pirated software and game mods. It targets data stored inside browsers, locally installed applications, and crypto wallets.
GReAT experts have analyzed a new targeted campaign by the ForumTroll APT group.
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
We follow the trail of a phishing attack to break down, step-by-step, what happens to the data stolen from users.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
How automation turns legitimate tools into a channel for malware delivery.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.
Millions of websites based on React and Next.js contain an easy-to-exploit vulnerability that can lead to complete server takeover. How to check if your server is vulnerable, and protect corporate web assets?
How researchers hacked DeckMate 2 card shufflers, and how the mafia exploited those very vulnerabilities to cheat at poker.
Identifying threats to embedded devices, and how the updated Kaspersky Embedded Systems Security can help in tackling them?
Researchers have discovered how to connect to someone else’s dashcam in a matter of seconds, and weaponize it for future attacks.
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.
Systematic measures and tools that organizations can use to defend against malicious browser extensions.