
Five signs ransomware is becoming an industry
With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.
469 articles
With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.
Ransomware operators sometimes resort to rather unconventional threats to get their victims to pay.
Unknown attackers tried to add a backdoor to PHP scripting language source code.
Several cybercriminal groups have exploited vulnerabilities in VMware ESXi to infect computers with ransomware.
Vietnam started a coordinated anticybercrime campaign at the government level in 2020. The results are amazing.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.
Would Johnny Mnemonic’s cybersecurity be plausible in the real 2021?
CD Projekt confirms attack on internal systems. Hackers claim to have downloaded Cyberpunk 2077 and The Witcher 3 source code, and demand ransom.
Seemingly overnight, the pandemic changed the way we work, and infosec departments are still adjusting. What’s on the horizon for employees in the coming year?
Can you transmit wireless data over a wired network? Evidence shows it can be done.
Computers don’t necessarily need a Wi-Fi module to transmit information over Wi-Fi, Israeli researchers have found.
We examine the first installment in the Die Hard series from a cybersecurity standpoint.
What do trading platform developers and operators need to keep in mind?
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
Among its other troubles, 2020 will be remembered as a year of explosive growth in ransomware infections.
We have updated our Open Threat Intelligence Portal, a tool for experts and security analysts.
Jeff and Dave talk innovation with Kaspersky CBO Alex Moiseev.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.