What is a credential stuffing attack?
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
3981 articles
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
Episode 345 of the Kaspersky podcast has password bans, ChatGPT hacks & do social media platforms have too much power?
Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
On World Password Day, we explain how we protect your sensitive data, and share tips for creating truly strong passwords.
Expanding Global Transparency Initiative by opening Istanbul Transparency Center and launching a Transparency Lab together with Boğaziçi University
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
Episode 344 of the Kaspersky podcast looks at Meta AI blunders, Grindr in the docks & do 5-year olds’ need mobile phones?
We explain why it’s preferable to use a thin client (especially running the updated Kaspersky Thin Client 2.0) in virtual desktop infrastructure
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
How to protect your company from mail bombs and other unwanted correspondence using personalized content filtering
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Episode 343 of the Kaspersky podcast has ransomware extortion via call centers, X controversy & more!
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
Episode 342 of the Kaspersky podcast focuses on politics, AI meddling, YouTube and a governmental honey trap.
Let’s talk about our updated line of corporate security solutions.
How to tell a real photo or video from a fake, and trace its provenance.