Transatlantic Cable podcast, episode 270
Episode 270 asks, what exactly is the ‘Metaverse’? Did Bruce Willis actually sell his image? And more!
3883 articles
Episode 270 asks, what exactly is the ‘Metaverse’? Did Bruce Willis actually sell his image? And more!
We explain how the NullMixer dropper can download numerous Trojans onto a device.
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
The developers of a run-of-the-mill Python module recently found out why old unpatched vulnerabilities can be dangerous.
Episode 269 looks at dodgy NFTs, Rockstar and Uber hacker arrested, and much more!
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Are you sure your former colleagues don’t have access to corporate data or systems?
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
We explain how the Harly Trojan subscriber targets Android users.
Episode 268 of the Transatlantic Cable includes chess shocks, GTA6 breach, antivax carrots and IHG wiper attack!
Introducing our new Transparency Center format and the opening of two more facilities in Europe.
Kaspersky Endpoint Detection and Response Optimum – superior enterprise-cybersecurity, with no fluff.
Episode 267 of the Transatlantic Cable includes Meta engineers unsure where data goes, Lazarus, bank thieves in gyms and more!
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
An unusual case of an attack executed by weaponizing legit video game code.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
Episode 266 of the Transatlantic Cable includes TikTok data breaches, Samsung and Meta woes, and doom scrolling!
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Highlights from “The nature of cyber incidents” report by the Kaspersky GERT team.
How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.