Key cybersecurity takeaways from the 2026 NDAA
A 4.1% increase in military cyber funding in the FY2026 NDAA budget underpins new requirements for hardened mobile devices, AI security frameworks, and expanded DoD cyber workforce...
Microsoft Patch Tuesday, December 2025 Edition
Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug ...
AI vs. Human Drivers
Two competing arguments are making the rounds. The first is by a neurosurgeon in the New York Times. In an op-ed that honestly sounds like it was paid for by Waymo, the author call...
GenAI-Security als Checkliste
Die OWASP-Checkliste fĂŒr AI Cybersecurity und -Governance verspricht schnelle UnterstĂŒtzung fĂŒr Unternehmen, um generative KI sicher einzusetzen.
5 Real-Word Third-Party Risk Examples
Explore 5 third-party risk examples, from vendor data breaches to supply chain attacks and learn how third-party risk management can prevent cyberattacks.
Friday Squid Blogging: Vampire Squid Genome
The vampire squid (Vampyroteuthis infernalis) has the largest cephalopod genome ever sequenced: more than 11 billion base pairs. Thatâs more than twice as large as the biggest squi...
Shai Hulud 2.0, now with a wiper flavor
Kaspersky researchers uncover new version of Shai Hulud nom worm, which attacks targets in Russia, India, Brazil, China and other countries, and has wiper features.
Exploits and vulnerabilities in Q3 2025
This report provides statistical data on vulnerabilities published and exploits we researched during the third quarter of 2025. It also includes summary data on the use of C2 frame...
Yippee-ki-yay, cybercriminals!
Welcome in! Youâve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the seasonâs juiciest ...
Kaspersky Security Bulletin 2025. Statistics
Kaspersky Security Bulletin contains statistics on various cyberthreats for the period from November 2024 to October 2025, which are based on anonymized data voluntarily provided b...
Banning VPNs
This is crazy. Lawmakers in several US states are contemplating banning VPNs, becauseâŠthink of the children! As of this writing, Wisconsin lawmakers are escalating their war on pri...
AI Malware: Hype vs. Reality
A grounded look at AI malware: most threats sit at low maturity levels, with no verified autonomous BYOAI attacks. Learn whatâs real, whatâs hype, and how defenders should respond.
The WIRED Guide to Digital Opsec for Teens
Practicing good âoperations securityâ is essential to staying safe online. Here's a complete guide for teenagers (and anyone else) who wants to button up their digital lives.
Prompt Injection Through Poetry
In a new paper, âAdversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models,â researchers found that turning LLM prompts into poetry resulted in jai...
When Buyers Discount MSPs With One Big Customer
Your biggest customer loves you. Three years together. They trust you, pay on time, and refer others. From where you sit, thatâs loyalty. From where a buyer sits, thatâs a $$$ disc...
Huawei and Chinese Surveillance
This quote is from House of Huawei: The Secret History of Chinaâs Most Powerful Company. âLong before anyone had heard of Ren Zhengfei or Huawei, Wan Runnan had been Chinaâs star e...
ToddyCat: your hidden email assistant. Part 1
Kaspersky experts analyze the ToddyCat APT attacks targeting corporate email. We examine the new version of TomBerBil, the TCSectorCopy and XstReader tools, and methods for stealin...
Inside the dark web job market
This report examines how employment and recruitment function on the dark web, based on over 2,000 job-related posts collected from shadow forums between January 2023 and June 2025.
Threat Intelligence Automation
Discover how threat intelligence automation from Recorded Future empowers security teams with real-time insights, faster response, and greater efficiency.
The Future of Humanoid Robotics
Humanoid robots are arriving faster than anyone expected. Discover the hidden risks, global power shifts, and breakthroughs shaping the future â before your competitors do.
Security Leaders Respond to Cloudfare Outage
On Tuesday, November 18, Cloudfare experienced an outage that led to several websites being slow to load or completely unavailable. The outage affected programs such at ChatGPT, X,...
Operational Cyber Threat Intelligence
Move beyond noise. Learn how to build effective threat intelligence operations that turn raw data into actionable insights and proactive cyber defense.
Microsoft Patch Tuesday, November 2025 Edition
Microsoft this week pushed security updates to fix more than 60 vulnerabilities in its Windows operating systems and supported software, including at least one zero-day bug that is...
Third-Party Risk Statistics
Explore the latest third-party risk statistics and learn how data-driven, continuous monitoring for third-party risk assessments can protect your supply chain.
Web Authentication is Broken
âThe real trouble with this world of ours is not that it is an unreasonable world, nor even that it is a reasonable one. The commonest kind of trouble is that it is nearly reasonab...
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security.
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security.
How are you managing cloud risk?
We know cloud-native application protection platform (CNAPP) helps manage cloud risk, however, these other elements must be considered.
Scammers Up Their Game With AI
Learn how to spot the threats and protect yourself from scammers using AI for phishing and deepfakes with smart security practices.
What is a Fraud Scheme?
The fraud auditing industry uses so many terms interchangeably that it creates confusion. Let's cut the confusion and implement better fraud definitions.
Beware: Tax Season is Scam Season
Tax season is also prime time for tax scams. To safeguard your personal information, consider these key points: Communication methods The IRS initiates contact primarily through ma...
âTis the Season for Holiday Shopping Scams
The holidays are typically the time of year for gifting presents to friends and family or donations to charity. Unfortunately, not-so-jolly fraudsters take advantage of this genero...
IRS Identity Theft Season Begins Now
Each year thieves try to steal billions in federal withholdings by stealing your identity. As the IRS focuses more attention on this quickly growing problem, now is the time of yea...
Five Ways to Protect Your Finances from Fraud
With fraud on the rise, itâs important to understand how to best protect yourself and your financial accounts. Here are five ways you can stay proactive to avoid fraudulent credit ...
The Worldâs Identity Platform
Learn about the new Trulioo integrated, high-speed, global identity platform that helps your organization foster growth, innovation and trust.