How not to go bankrupt from industrial digitalization
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
218 articles
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
Malicious actors are busy setting up fake Netflix websites, trying to trick visitors into paying for supposedly legitimate subscriptions, and promising in-game currency and skins for popular games. How else are they scamming Gen Zers, and what can we do to fight back?
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite games from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
Fending off ransomware attacks that exploit corporate IoT devices.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Kaspersky specialists, in collaboration with external experts, have formulated some key guidelines for safe and legal use of AI.
What IT and cybersecurity leaders need to know about implementing network detection and response.
AI is disrupting security strategies, creating risks alongside opportunities to build more adaptive, effective protection – leaving InfoSec professionals increasingly concerned.
Why international standards are important, and how Kaspersky contributes to IoT standardization.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
How to protect the less obvious parts of your IT infrastructure (and from what) — from printers and video surveillance kit to insulin pumps.
A new vulnerability allows remote attackers to gain root privileges on Linux servers. How easy is it for CVE-2024-6387 to be exploited – and how to prevent it
Kaspersky ICS-CERT experts have discovered several critical vulnerabilities in Telit Cinterion M2M modems, which are used in millions of devices.
Hackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more recently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down what happened and how it could have been avoided.
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
Security companies offer smart technologies — primarily cameras — to protect your home from burglary, fire and other incidents. But what about protecting these security systems themselves from intruders? We fill this gap.