DarkVishnya attacks from inside
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
656 articles
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
A supply-chain attack against Copay cryptowallets through an open-source library enables bitcoin theft.
Our statistics show that WannaCry, far from fading away, was responsible for 30% of ransomware attacks in Q3 2018.
Resources for security professionals to analyze vendor capabilities across a wide variety of threat intelligence services.
I decided to conduct a sort-of audit to try and see to what extent our presentation of the facts has allowed people to make up their own minds on the matter.
See how your views on cybersecurity line up with the opinions of CISOs from around the world.
Some comments from Kaspersky Lab’s head of information security on the results of the CISO survey.
How an analyst can build a threat intelligence workflow to run effective and complex investigations.
Our tools to secure, monitor, and manage customer infrastructure can be integrated with Autotask PSA.
The Microsoft Windows vulnerability CVE-2018-8453, which was used in several attacks this summer, was detected proactively.
Given the great need for it on the part of our corporate customers – true to the market principles of supply and demand – we decided to come up with a new service for the market – Kaspersky Managed Protection.
Case study: An analysis of insufficient safety practices at a small advertising agency.
Remote Administration Tools in ICS environment are an additional risk factor, and not necessarily a justified one.
Forgotten online resources can be used for extortion or phishing
How businesses globally handle personally identifiable information.
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
Start protecting your network by stopping potential threats way before they can get too close — on the Internet gateway level.
Our Security Services folks published a report on the errors they see most — here they give advice on how to make your infrastructure more cyberresilient.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.