MAP
STATISTICS
DATA SOURCES
BUZZ
WIDGET
Language
EN
DE
ES
FR
IT
JA
PT
RU
TR
CN
SHARE
Am I Infected?
CYBERTHREAT
LIVE MAP
EN
DE
ES
FR
IT
JA
PT
RU
TR
CN
Am I Infected?
MAP
STATISTICS
DATA SOURCES
BUZZ
WIDGET
Share
Kimsuky targets organizations with PebbleDash-based tools
A Rio Negro cruise: monkeys, piranhas, sloths, dolphins, and snakes.
Enhanced protection with device performance booster
Kaspersky Standard
LLMjacking: what these attacks are, and how to protect AI servers
Kaspersky Next
State of ransomware in 2026
From desert to jungle: window-seat scenery and airport adventures.
Security. Performance. Privacy. All in one easy-to-use app.
Kaspersky Plus
When’s a geyser not a geyser? When it’s in El Tatio, Chile!
The Evolution of Kaspersky SIEM | Kaspersky official blog
CVE-2025-68670: discovering an RCE vulnerability in xrdp
Complete protection for your devices, privacy, and identity
Kaspersky Premium
Kaspersky Next
Nearly half of the world’s passwords can be cracked in under a minute | Kaspersky official blog
Exploits and vulnerabilities in Q1 2026
An icebreaker museum with an unusual history.
OceanLotus suspected of using PyPI to deliver ZiChatBot malware
Enhanced protection with device performance booster
Kaspersky Standard
How VoidStealer bypasses Chrome’s protections to hijack sessions and steal data | Kaspersky official blog
Kaspersky Next
Websites with an undefined trust level: avoiding the trap
800 kilometers of ice road!
Security. Performance. Privacy. All in one easy-to-use app.
Kaspersky Plus
Supply chain attack via DAEMON Tools | Kaspersky official blog
The motivation of droids from the “Star Wars” universe | Kaspersky official blog
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security
Complete protection for your devices, privacy, and identity
Kaspersky Premium
Kaspersky Next
Atacama – pt. 4: two touriosities: the Valley of Death, and pale flamingoes.
Atacama – pt. 3: Valley of the Moon.
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
Vehicle-based surveillance tools | Kaspersky official blog
Enhanced protection with device performance booster
Kaspersky Standard
Atacama – pt. 2: Devil’s Throat.
Kaspersky Next
A practical guide to secure vibe-coding for small businesses | Kaspersky official blog
Phishing crypto-wallet clones in the App Store and other attacks on iOS and macOS crypto owners | Kaspersky official blog
Security. Performance. Privacy. All in one easy-to-use app.
Kaspersky Plus
A mind-blowing museum.
The Bratsk Hydroelectric Power Plant: +1 = 8!
Eavesdropping via fiber-optic cables | Kaspersky official blog
Complete protection for your devices, privacy, and identity
Kaspersky Premium
Kaspersky Next
PhantomRPC: A new privilege escalation technique in Windows RPC
FakeWallet crypto stealer spreading through iOS apps in the App Store
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Enhanced protection with device performance booster
Kaspersky Standard
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Kaspersky Next
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Security. Performance. Privacy. All in one easy-to-use app.
Kaspersky Plus
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
Complete protection for your devices, privacy, and identity
Kaspersky Premium
Kaspersky Next
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year