Home Blog Page 155

IoT lottery: finding a perfectly secure connected device

Black Friday and Cyber Monday are great for shopping. Vendors flood the market with all kinds of goods, including lots of exciting connected devices that promise to make our life easier, happier and more comfortable. Being enthusiastic shoppers just like many other people around the world, at Kaspersky Lab we are, however paranoid enough to look at any Internet...

Five Reasons CISOs Should Keep an Open Mind About Cryptocurrencies

Far from a dying breed, cryptocurrencies are not only evolving but being accepted in countless new markets. CISOs need to know the ins and outs, pros and cons. - Read more

The Hunt for IoT: The Rise of Thingbots

With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs point to them becoming the attacker infrastructure of the future. - Read more

Achieving Multi-Dimensional Security through Information Modeling – Part 1

Information modeling blends lateral thinking and deductive logic. Applied to information security, it’s a powerful technique for designing a security architecture with multi-dimensional controls that minimizes risk and achieves continuous compliance. - Read more

Latest article

Metasploit Wrap-Up 03/20/2026

♫ I Just Called ♫ To Say ♫ 7f45 4c46 0201 0100 0000 0000 0000 0000 0300 3e00 0100♫This release contains 2 new exploit modules,...

Fake ‘Trusted Sender’ Labels Misused in New Apple Mail Phishing Scheme

Fake “trusted sender” labels can mislead users, as scammers embed them into email bodies to disguise phishing emails and create a false sense of...

CVE-2026-26118 Azure MCP Server Tools Elevation of Privilege Vulnerability

Added products to the Security Updates table that document the various packaging methods used to deliver Azure MCP Server Tools. - Read more

mod_gnutls Multiple Vulnerabilities

mod_gnutls Multiple Vulnerabilities Multiple vulnerabilities exist in mod_gnutls. CVE-2026-33307 Stack-based Buffer Overflow in Client Certificate Chain Processing CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (7.5)A client certificate chain with more than 8...