APT groups are distributing AI models with hidden backdoors, warns Waldemar Bergstreiser of Kaspersky in an interview.

APT groups are distributing AI models with hidden backdoors, warns Waldemar Bergstreiser of Kaspersky in an interview.
Cybersecurity is a complex interplay of prevention, detection, response, and reflection, says guest author Alexander Bogocz of Skaylink.
Trends 2025: Mobile Risks, Phishing Techniques, and Sideloading Attacks
A Kaspersky study highlights emerging risks, including quantum-safe ransomware and increased attacks on mobile devices.
'In the future, customers' trust in car brands will be measured by how they handle cybersecurity and prevent external attacks,' says Professor Stefan Bratzel from CAM.
Attackers are increasingly using sophisticated techniques to disguise their attacks and deploy adaptive attack patterns, warns Elena Simon from Gcore.
HP’s latest Threat Insights Report reveals how cybercriminals are leveraging generative AI to craft malicious code.
ESET researchers have discovered that the group is using ScRansom ransomware.
Telekom opens its Master Security Operations Center in Bonn, analyzing billions of security-relevant data points per day.
Professional hackers are quick to learn about security vulnerabilities and conduct attacks within 24 hours to find new entry points into corporate networks.
KPMG study: phishing, attacks on cloud services and attacks via data leaks are the most common crimes.
Autonomous pentests from the cloud can be used to identify vulnerabilities.
HP Wolf Security Threat Insights Report shows how cybercriminals are increasingly diversifying their attack methods to circumvent security policies and detection tools.
Olympic Games also serve as a playing field in the ever-evolving landscape of cyber security, warns Check Point's Marco Engerling.
Ransomware-as-a-service is a lucrative business and in the hands of professionally organised groups. Now criminals can resort to quickly cobbled-together junk ransomware.
Schiffl IT: Identifying anomalies in network traffic and systems in real time.
Cybersecurity expert Oded Vanunu from Check Point warns about the number of attacks rather than the quality of cyberattacks by AI.
Guest author Frank Becker shows what alternatives are available to protect hospitals against cyber attacks.
Should companies negotiate with ransomware attackers and pay the ransom demanded?
Large language models (LLM) are finding their way into more and more IT products. From Kaspersky's perspective, this means that the size of the attack surface is increasing significantly.
Zscaler ThreatLabz Report: Encrypted malware and malicious content are one of the biggest threats, accounting for 78 percent of observed attacks.
Cybercriminals are greedy for profit, looking for the least resistance, says Chester Wisniewski of Sophos.
Attackers are teasing would-be cyber criminals by deploying fake malware kits on code-sharing platforms like GitHub.
Christoph Buschbeck from VMware explains how companies protect their networks and data in a multi-cloud world.
Customer data of the Danish cloud service provider is irretrievably lost. A commentary by Patrick Englisch of Veritas Technologies.
Why "working from the beach" poses a threat to businesses, explains Zscaler's Tony Fergusson.
Building an internal security operations centre is neither easy nor cheap. However, an external SOC also brings challenges, says Jochen Koehler of Ontinue.
Cisco XDR can automatically detect, backup and restore business-critical data.
Those who rely more on AI and automation shorten the life cycles of leaks by 81 days and reduce the follow-up costs per incident by 1.76 million euros.
Vectra study shows: Almost all SOC analysts fear missing relevant security events.