How to stop exploitation of CVE-2024-49040
The patch that fixes CVE-2024-49040 in Microsoft Exchange is temporarily unavailable. We’ve implemented heuristics that detect attempts to exploit it.
The patch that fixes CVE-2024-49040 in Microsoft Exchange is temporarily unavailable. We’ve implemented heuristics that detect attempts to exploit it.
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
A vulnerability that permits bypassing authentication has been found in a popular security hardening plugin for WordPress.
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
Analyzing incidents and drawing lessons from them should be an integral part of the incident response process. This can help improve the overall security level of a company.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
Many of us have dozens of online subscriptions and recurring payments. How to take control, save money, and stay on top of expenses?
A detailed guide on setting up privacy in the adidas Running app.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.