Europe’s phone networks are drowning in fake calls

Caller ID spoofing has become one of Europe’s most persistent enablers of cyber fraud. A new position paper from Europol warns that manipulated phone identities now drive much of the continent’s financial and social engineering crime, making it difficu… Continue reading Europe’s phone networks are drowning in fake calls

Biometric spoofing isn’t as complex as it sounds

Biometric technologies were originally designed to improve security and streamline authentication, but they’re often misused in ways most people don’t notice. Like any system, biometrics has weaknesses that attackers can exploit. Biometric spoofing isn… Continue reading Biometric spoofing isn’t as complex as it sounds

Cookies and how to bake them: what they are for, associated risks, and what session hijacking has to do with it

Kaspersky experts explain the different types of cookies, how to configure them correctly, and how to protect yourself from session hijacking attacks. Continue reading Cookies and how to bake them: what they are for, associated risks, and what session hijacking has to do with it

Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability

Zyxel users beware: A critical remote code execution flaw (CVE-2023-28771) in Zyxel devices is under active exploitation by a Mirai-like botnet. GreyNoise observed a surge on June 16, targeting devices globally. Continue reading Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability