ShadowHammer: Malicious updates for ASUS laptops
Our technologies detected a threat that seems to be one of the biggest supply-chain attacks ever.
38 articles
Our technologies detected a threat that seems to be one of the biggest supply-chain attacks ever.
The day I turned home network defender and stopped making fun of IoT developers.
Even if you are really not an interesting target for an APT actor, you can still be used in a malware delivery chain
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
At this year’s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain’s loyalty card system, a taxi service, and an airport
Internet of things is not getting any safer: Our experts analyzed a smart camera and found numerous vulnerabilities.
Yachts are now Internet-friendly — and vulnerable because developers aren’t focusing on information security.
One of the most sophisticated APT campaigns ever analyzed by our experts.
Who hacked the Olympics? How can malware spread over routers? And what’s Sofacy up to?
Experts from Kaspersky Lab studied digital evidence related to the hacking attack on the 2018 Olympics in search of the actual attacker.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
Security experts highlight potential entry points into healthcare networks and describe relevant cyberthreats
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
PUNTA CANA – Security professionals, law enforcement officials, and journalists converged on the Dominican Republic’s Punta Cana resort town for Kaspersky Lab’s extravagant Security Analysts Summit, which came on the
Vitaly Kamlyuk of Kaspersky Lab explains the dangers of the vulnerable anti-theft software installed on ~2 million laptops. [youtube http://www.youtube.com/watch?v=Gq8-7EErqpM]
Steve Adegbite, Director of Cybersecurity Strategies at Lockheed Martin, explains the “Cyber Kill Chain” in order to keep intruders out and shut down attacks if a system has been breached