Zero-day vulnerability in Internet Explorer
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
33 articles
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
Why you should update to the latest version of Google Chrome, Microsoft Edge, Opera, Yandex Browser, Vivaldi, Brave and other Chromium-based browsers.
Kaspersky experts discover a CLFS vulnerability being exploited by cybercriminals.
Our technologies detected targeted attacks involving a number of zero-day exploits.
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
A zero-day vulnerability in Microsoft Windows may already have been exploited.
Version 14.4 patches vulnerabilities that cybercriminals are actively exploiting. Install this update as soon as possible.
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
During a cyberattack in Hong Kong, LightSpy spyware infected the iPhones of people visiting counterfeit news sites.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
A newly discovered vulnerability allows hackers to eavesdrop on WhatsApp users, read their chats, and install spyware just by calling them. Update the app now!
A new strain of Mirai is equipped with a much wider range of exploits, including some targeted at enterprise-class IoT devices.
Embedded systems demand special protection from infections similar to WannaCry.
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
The threat landscape is always evolving. How can you protect your business?