Attack on cybersecurity researchers: pseudo-exploit for regreSSHion
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
1201 articles
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
The JavaScript CDN service Polyfill.io has started spreading malicious code. Remove the service’s script from your website.
A new vulnerability allows remote attackers to gain root privileges on Linux servers. How easy is it for CVE-2024-6387 to be exploited – and how to prevent it
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
Our experts have discovered ransomware they’ve dubbed “ShrinkLocker”, which encrypts infected computers’ drives using BitLocker — a utility built into Windows.
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
We’re expanding the capabilities of the Kaspersky Unified Monitoring and Analysis SIEM system by adding new normalizers and correlation rules.
Threat actors are targeting hotel staff with malicious and phishing e-mails.
We’ve released a free application that allows you to scan Linux systems for known cyberthreats.
Today we discuss which services and applications should be patched first, and what attackers are focusing on.
dormakaba Saflok locks — used on around three million doors across 13,000 hotels — are vulnerable to an attack that involves forging electronic keycards.
What’s new in Kaspersky Unified Monitoring and Analysis Platform 3.0.3.
Cybercriminals prey on corporate credentials by sending phishing links through Dropbox after priming the victim.
Kaspersky ICS-CERT experts have discovered several critical vulnerabilities in Telit Cinterion M2M modems, which are used in millions of devices.
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
Expanding Global Transparency Initiative by opening Istanbul Transparency Center and launching a Transparency Lab together with Boğaziçi University
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.