A hardware vulnerability in Apple's “M” series CPUs can be exploited to hack encryption algorithms.
https://www.kaspersky.com/blog/apple-cpu-encryption-vulnerability/50869/
The key signs of boss-scam schemes, and ways to protect against them.
https://www.kaspersky.com/blog/how-to-spot-and-prevent-boss-scams/50861/
A method of stealing data through side channels by eavesdropping on keyboard keystrokes.
https://www.kaspersky.com/blog/acoustic-side-channel-attack/50857/
Episode 340 of the Kaspersky podcast includes big-tech lawsuit drama, and the dangers of age-verification.
https://www.kaspersky.com/blog/transatlantic-cable-podcast-340/50854/
Kaspersky products and solutions took 93 first places out of 100 independent tests in 2023.
https://www.kaspersky.com/blog/how-to-choose-best-cybersecurity-product/50842/
What measures should IT and InfoSec services take to “harden” against LotL attacks that leverage LOLBins and LOLBAS?
https://www.kaspersky.com/blog/lotl-attacks-detection-hardening-guidance/50826/
We discuss commercial spyware — particularly the capabilities of the most well-known instances: Pegasus, DevilsTongue, Predator, Subzero, Heliconia, and Reign.
Episode 339 of the Kaspersky podcast looks at TikTok, spyware Reddit IPO and much more!
https://www.kaspersky.com/blog/transatlantic-cable-podcast-339/50805/
We explain what SIM swapping is, how such attacks can hurt organizations, and how to guard against them.
PMKID interception is the simplest, most effective, and least noticeable way to hack Wi-Fi networks. We explain how this attack works and how to defend against it.