Data sovereignty proof: How to verify controls like ‘Project Texas’

“Sovereignty isn’t just a region on a map — it’s an operating model. The hard part…

Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts

He added, Agenda Ransomware exploits Windows-centric assumptions, under-protected RMM tools, and neglected driver monitoring. Most organizations…

Europol disrupts network behind 49 million fake accounts

On October 10, Europol, in cooperation with police authorities in Estonia, Finland, Latvia and Austria, raided…

Risks of recovering from ransomware attacks

“The 60 percent recovery rate reflects several technical and operational realities that regularly arise when responding…

Smashing Security podcast #439: A breach, a burnout, and a bit of Fleetwood Mac

A critical infrastructure hack hits the headlines – involving default passwords, boasts on Telegram, and a…

Hacktivism in 2025: what it looks like and how hashtags help analyze it

What do hacktivist campaigns look like in 2025? To answer this question, we analyzed more than…

Mysterious Elephant APT: TTPs and tools

Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group that we at Kaspersky…

The Government Shutdown Is a Ticking Cybersecurity Time Bomb

Amid a government shutdown that has dragged on for more than five weeks, the United States…

Mexico City Is the Most Video-Surveilled Metropolis in the Americas

“What is recommended is that when something happens, they go to open the folder and the…

Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

When billionaire Dutch TV producer John de Mol sued Facebook in 2019 over its alleged failure…