
Hidden links to… porn sites – on your company website
Attackers are abusing legitimate websites to host hidden SEO links. We break down their tactics, and what you can do about it.
498 articles
Attackers are abusing legitimate websites to host hidden SEO links. We break down their tactics, and what you can do about it.
Two separate research papers vividly demonstrate how virtual systems can be compromised in a hostile environment — specifically, when the data owner can’t even trust the cloud provider.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
Attackers pretending to be airlines or airports are sending out fake partnership offers.
Our experts trained an ML model to detect attempts to use DLL hijacking, and integrated it into the Kaspersky SIEM system.
Phoenix, a new variant of the Rowhammer attack, makes it possible to attack DDR5 memory modules.
A fresh research paper shows how complex vulnerabilities in CPUs can be leveraged in the most pertinent attacks on cloud-based systems.
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
A new large-scale attack on a popular JavaScript code registry has hit around 150 packages. The automatic propagation of the threat makes it especially dangerous — developers need to react ASAP.
Unknown attackers have compromised several popular npm packages in a supply-chain attack.
Most employees are already using personal LLM subscriptions for work tasks. How do you balance staying competitive with preventing data leaks?
WordPress sites are increasingly becoming targets of attacks exploiting vulnerabilities in plugins and themes. In this post, we examine recent cases and share protection tips.
A popular developer tool has been trojanized and is uploading secrets to public GitHub repositories. We discuss what’s important to know for both developers and cybersecurity services.
How attackers can hijack your computer through its webcam — and how to stop it.
Attackers spin poignant tales of lost private keys as they try to phish seed phrases.
Google experts have demonstrated how complex hardware vulnerabilities in CPUs can be effectively exploited.
Researchers have devised a theoretical attack to steal private encryption keys through monitoring standard CPU and OS behavior.
Companies need to build a culture of security, but this is impossible when employees are afraid to discuss incidents or suggest improvements.
Using anomalies in the behavior of users, devices, applications, and other entities to detect cyberthreats.
Attackers are sending phishing emails to developers of PyPi packages and Firefox add-ons.
We dive into which corporate systems support passkeys, where compatibility falls short, and why we probably won’t be saying goodbye to passwords anytime soon.