Smashing Security podcast #439: A breach, a burnout, and a bit of Fleetwood Mac

A critical infrastructure hack hits the headlines – involving default passwords, boasts on Telegram, and a…

Hacktivism in 2025: what it looks like and how hashtags help analyze it

What do hacktivist campaigns look like in 2025? To answer this question, we analyzed more than…

Mysterious Elephant APT: TTPs and tools

Introduction Mysterious Elephant is a highly active advanced persistent threat (APT) group that we at Kaspersky…

The Government Shutdown Is a Ticking Cybersecurity Time Bomb

Amid a government shutdown that has dragged on for more than five weeks, the United States…

Mexico City Is the Most Video-Surveilled Metropolis in the Americas

“What is recommended is that when something happens, they go to open the folder and the…

Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan

When billionaire Dutch TV producer John de Mol sued Facebook in 2019 over its alleged failure…

Zohran Mamdani Just Inherited the NYPD Surveillance State

Mamdani’s campaign did not respond to a request for comment. The NYPD’s turn toward mass surveillance…

FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

Criminals posing as US immigration officers have carried out robberies, kidnappings, and sexual assaults in several…

Customer Experience & Marketing: Why CX Matters More Than Any Other Marketing KPI Right Now

I’m fortunate to work on exciting marketing campaigns for fantastic Nickelodeon and Paramount+ titles. But I…

The 7 Types of Social Media and Pros & Cons of Each (Research)

As a former journalist, I spent years digging through social media feeds to write juicy stories.…