Wireshark 4.4 boosts network protocol visibility
The open source Wireshark network protocol analyzer is among the most widely used technologies by networking professionals. Version...
Ransomware attacks continue to increase in the US, UK, and Canada
Ransomware is one of the most dangerous and fast-growing threats in the digital world today. It’s a type...
Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus
A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located...
New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems
Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with...
Multiple Cisco Products OpenSocial Gadget Editor Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Finesse, Cisco Virtualized Voice Browser, and Cisco Unified Customer...
Halliburton confirms data stolen in recent cyberattack
Oil and gas giant Halliburton has confirmed in a filing today to the Securities and Exchange Commission (SEC)...
Product Safety Report: Large Mizzie the Kangaroo Natural Teething Toy (2302-0133 and 2409-0004)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
A deep dive into the most interesting incident response cases of last year
In 2023, Kaspersky’s Global Emergency Response Team (GERT) participated in services around the world that allowed our experts...
Phone companies asked to help tackle rise in thefts
Some 78,000 people had their phone or bag snatched last year, more than double the previous year. Source::...
Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users
Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking...
Businesses struggle to balance AI tools and employee skills
Artificial intelligence promises businesses greater revenue, productivity, and operational efficiencies, but according to recent research from CompTIA, business...
IT threat evolution in Q2 2024. Non-mobile statistics
The statistics presented here are based on detection verdicts by Kaspersky products and services received from users who...
IT threat evolution in Q2 2024. Mobile statistics
Quarterly figures According to Kaspersky Security Network, in Q2 2024: 7 million attacks using malware, adware or unwanted...
IT threat evolution Q2 2024
Targeted attacks XZ backdoor: a supply chain attack in the making On March 29, a message on the Openwall...
Secrets Exposed: Why Your CISO Should Worry About Slack
In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to...
New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access
Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated...
Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt
A 57-year-old man from the U.S. state of Missouri has been arrested in connection with a failed data...
Inside the deepfake porn crisis engulfing Korean schools
The crisis engulfing more than 500 schools and universities involves many underage victims. Source:: BBC News – Technology
Young workers drive South Africa’s video games industry
South Africa has a small but thriving video games industry, helped by plenty of young workers. Source:: BBC...
Making progress on routing security: the new White House roadmap
The Internet can feel like magic. When you load a webpage in your browser, many simultaneous requests for...