How attackers use databases of stolen or leaked passwords to carry out credential stuffing attacks.
https://www.kaspersky.com/blog/what-is-credential-stuffing/51199/
A small program called Googerteller emits a sound every time your browser accesses Google and the most common advertising trackers.
https://www.kaspersky.com/blog/googerteller-sound-of-trackers/51186/
Episode 345 of the Kaspersky podcast has password bans, ChatGPT hacks & do social media platforms have too much power?
https://www.kaspersky.com/blog/transatlantic-cable-podcast-345/51176/
Information security problems in the third season of “Star Wars: The Bad Batch” animated series
https://www.kaspersky.com/blog/bad-batch-season-3-cybersecurity/51172/
How Dropbox Sign was hacked, what data was leaked during the attack, and what users should do to protect themselves from the consequences of the hack
World Password Day: we explain how we protect your sensitive data, and share tips for creating mnemonic passwords.
https://www.kaspersky.com/blog/kaspersky-international-password-day-2024/51095/
Expanding Global Transparency Initiative by opening Istanbul Transparency Center and launching a Transparency Lab together with Boğaziçi University
How CNAME hijacking and SPF record exploitation are used in the SubdoMailing campaign to send spam from legitimate company domains.
https://www.kaspersky.com/blog/domain-hijacking-subdomailing/51097/
Episode 344 of the Kaspersky podcast looks at Meta AI blunders, Grinder in the docks & do 5 year olds’ need mobile phones?
https://www.kaspersky.com/blog/transatlantic-cable-podcast-344/51090/
Why you should use a thin client running the updated Kaspersky Thin Client 2.0 OS in your virtual desktop infrastructure
https://www.kaspersky.com/blog/kaspersky-thin-client-2-0/51086/