![Intimate image abuse – Kaspersky new survey indicates alarming trends](https://media.kasperskydaily.com/wp-content/uploads/sites/92/2024/07/18065012/the-naked-truth-iia-featured-900x592.jpg)
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
Independent cybersecurity lab AV-Comparatives put 15 anti-phishing solutions to the test — with only eight making the grade. We took home the gold, adding to our already extensive collection of accolades.
Medium-sized businesses increasingly find themselves on the receiving end of targeted attacks. What tools does one need when basic security proves inadequate?
The updated VPN & Antivirus by Kaspersky for iOS now supports Apple Shortcuts and Siri. We explain what you can do with this feature, and how to set it up.
Someone is targeting security experts using an archive that allegedly contains an exploit for the regreSSHion vulnerability.
The JavaScript CDN service Polyfill.io has started spreading malicious code. Remove the service’s script from your website.
A turnkey home? A turnkey website? How about turnkey phishing? Scammers now sell turnkey phishing services to other scammers. Read on to find out how it works.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
The new AI function in Microsoft Windows has already been dubbed a “security nightmare” on the internet. What risks does it carry, and how to stay safe?
We discuss key aspects of WhatsApp’s security and privacy, and how to configure this messenger to enhance protection.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!