Vulnerable updates in Cisco enterprise software
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
3302 articles
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
It’s time to take control of your own cybersecurity and make your online world a safer place.
The developers of a run-of-the-mill Python module recently found out why old unpatched vulnerabilities can be dangerous.
Episode 269 looks at dodgy NFTs, Rockstar and Uber hacker arrested, and much more!
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Are you sure your former colleagues don’t have access to corporate data or systems?
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
Episode 268 of the Transatlantic Cable includes chess shocks, GTA6 breach, antivax carrots and IHG wiper attack!
We explain how the Harly Trojan subscriber targets Android users.
Introducing our new Transparency Center format and the opening of two more facilities in Europe.
Kaspersky Endpoint Detection and Response Optimum – superior enterprise-cybersecurity, with no fluff.
Episode 267 of the Transatlantic Cable includes Meta engineers unsure where data goes, Lazarus, bank thieves in gyms and more!
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
An unusual case of an attack executed by weaponizing legit video game code.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
Episode 266 of the Transatlantic Cable includes TikTok data breaches, Samsung and Meta woes, and doom scrolling!
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Highlights from “The nature of cyber incidents” report by the Kaspersky GERT team.
How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.
From an ex-Twitter exec blowing the whistle to Janet Jackson’s song crashing hard drives – it’s episode 265 of the Transatlantic Cable podcast.