New ransomware: a cross-platform future
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
656 articles
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
Our experts studied the shadow market for initial access to corporate infrastructure.
Kaspersky Managed Detection and Response experts identified the adversarial techniques that were most prevalent cybersecurity incidents in 2021.
Our experts studied the WinDealer malware created by the LuoYu APT group.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
What should an incident response specialist be able to do and how can they improve their skills?
The Department of Homeland Security is urging US federal agencies to “patch or remove” a list of VMware products within five days. Probably you should do it too.
For Anti-Ransomware Day, we decided to publish few tips that will help your company avoid falling victim to ransomware for a second time.
Time to update Windows! Microsoft has released patches for several dozen vulnerabilities, one of which cybercriminals are actively exploiting.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
Our cryptanalysts have found a way to decrypt files encrypted by Yanluowang.