CVE-2024-43451 and other reasons to update ASAP
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
3981 articles
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
Analyzing incidents and drawing lessons from them should be an integral part of the incident response process. This can help improve the overall security level of a company.
Web pages often disappear, move, or change content. How to keep them the way you want, or easily locate a web archive?
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
Rules for detecting atypical behavior in container infrastructure at the data collection stage, and other updates to our SIEM system.
Hackers continue to target developers: during a fake job interview, they ask “potential employees” to run a script from GitHub that hides a backdoor.
Many of us have dozens of online subscriptions and recurring payments. How to take control, save money, and stay on top of expenses?
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
We share our experience on the optimal use of AI models in the SOC of our Kaspersky MDR service.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
AI has dozens of applications in cybersecurity. Which ones are the most effective?
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.