How the adversary-in-the-middle technique is used in spearphishing attacks
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
16 articles
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Security training aimed at IT teams, service desks, and other technically advanced staff.
Our new version of Kaspersky Endpoint Security Cloud combines time-proven security technologies with the flexibility of a software-as-a-service model.
The process is undoubtedly underway, but it is going much slower than enthusiasts like to think.
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
Some business owners see cyberprotection as just more software to manage. But it is much more than that.
Your data may move off-site, but does that mean you’re not responsible for it?
See a few highlights from the RSA Conference 2018 in San Francisco.
A cloud instrument for detailed malware activity analysis.
Even though built-in Office 365 spam filters stop most spam, what gets through can be enough to cause significant damage
How to protect and control workloads in the AWS public cloud
Kaspersky Private Security Network brings users all of the advantages of the cloud without violating regulations or internal security policies.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”