“Sovereignty isn’t just a region on a map — it’s an operating model. The hard part…
Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts
He added, Agenda Ransomware exploits Windows-centric assumptions, under-protected RMM tools, and neglected driver monitoring. Most organizations…
Europol disrupts network behind 49 million fake accounts
On October 10, Europol, in cooperation with police authorities in Estonia, Finland, Latvia and Austria, raided…
Risks of recovering from ransomware attacks
“The 60 percent recovery rate reflects several technical and operational realities that regularly arise when responding…
Smashing Security podcast #439: A breach, a burnout, and a bit of Fleetwood Mac
A critical infrastructure hack hits the headlines – involving default passwords, boasts on Telegram, and a…
Hacktivism in 2025: what it looks like and how hashtags help analyze it
What do hacktivist campaigns look like in 2025? To answer this question, we analyzed more than…
Mysterious Elephant APT: TTPs and tools
Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group that we at Kaspersky…
The Government Shutdown Is a Ticking Cybersecurity Time Bomb
Amid a government shutdown that has dragged on for more than five weeks, the United States…
Mexico City Is the Most Video-Surveilled Metropolis in the Americas
“What is recommended is that when something happens, they go to open the folder and the…
Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan
When billionaire Dutch TV producer John de Mol sued Facebook in 2019 over its alleged failure…