![How ShrinkLocker ransomware leverages BitLocker](https://webcf.waybackmachine.org/web/20240614024739/https://media.kasperskydaily.com/wp-content/uploads/sites/92/2024/06/13095436/shrinklocker-ransomware-encrypts-with-bitlocker-featured-900x592.jpg)
ShrinkLocker ransomware employing BitLocker for encryption
Our experts have discovered ransomware they’ve dubbed “ShrinkLocker”, which encrypts infected computers’ drives using BitLocker — a utility built into Windows.
Our experts have discovered ransomware they’ve dubbed “ShrinkLocker”, which encrypts infected computers’ drives using BitLocker — a utility built into Windows.
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
Two-factor authentication protects your account from theft — until you yourself give away your one-time password.
We discuss key aspects of WhatsApp’s security and privacy, and how to configure this messenger to enhance protection.
We’re expanding the capabilities of the Kaspersky Unified Monitoring and Analysis SIEM system by adding new normalizers and correlation rules.
A recent zero-click vulnerability in TikTok has led to high-profile accounts being taken over.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
Threat actors are targeting hotel staff with malicious and phishing e-mails.
Fake tech-support has long been a trend in fraud worldwide. We explain how it works, and what you can do to protect yourself.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!
Can you catch malware by downloading files from Microsoft’s repositories on GitHub? Turns out, you can. Stay alert!
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.