
Tarot and cyberthreats: a new Trojan for fans of the supernatural
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
Fending off ransomware attacks that exploit corporate IoT devices.
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
A security researcher has investigated his own smart mattress cover, discovering several ways to hack it — including through a backdoor preinstalled by the developer.
Our technologies have helped to detect the zero-day vulnerability CVE-2025-2783 in Google Chrome, which was used in a sophisticated APT attack.
How to counter new privacy invasions by browser developers
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Takeaways for regular crypto holders from the biggest crypto heist in history.
Online converters are a tempting but dangerous way to change file formats. We tell you how to convert files and not get trojanized.
We break down the most covert mechanism of smartphone surveillance using real-life examples.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
ACCEPT AND CLOSE
Notifications