
How Interlock attacks IT specialists with fake CAPTCHAs and ClickFix
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
1253 articles
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
How organizations implement zero-trust principles, and what CISOs advise for project success.
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
Researchers have found a way to exploit a security mechanism in a popular machine-learning framework.
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?
Scammers are exploiting GetShared to bypass email security.
Attackers use the polyglot technique to disguise malware. We explain what it is and how to protect your company against attacks.
Fending off ransomware attacks that exploit corporate IoT devices.
Our technologies have helped to detect the zero-day vulnerability CVE-2025-2783 in Google Chrome, which was used in a sophisticated APT attack.
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
How to respond to a compromised GitHub changed-files Action incident.
Reasons for updating your ESXi infrastructure ASAP, and enterprise threats that VM escape poses.
Microsoft’s March Patch Tuesday fixes several vulnerabilities that have already been used in the wild. Details are not clear at the moment, but it’s worth installing the patches ASAP.
We’ve added technology that checks QR codes in emails for phishing links.
What information does an MDR service need to protect a company from complex targeted attacks?
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
A step-by-step guide to scanning disk arrays weighing tens of terabytes with the aid of Kaspersky products.