Invisible implants in source code
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
167 articles
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Kaspersky’s Ask the Analyst service will ease access to our expertise.
On October’s Patch Tuesday, Microsoft patched 71 vulnerabilities, several of which are particularly serious.
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
IT Security Economics 2021 report: Infosec’s top 5 challenges dealing with complex incidents.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
The Open Management Infrastructure agent, with four vulnerabilities, is being automatically installed on virtual Linux machines on Microsoft Azure.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Malefactors are looking for vulnerable Confluence servers and exploiting CVE-2021-26084, an RCE vulnerability.
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
Our technologies detected targeted attacks involving a number of zero-day exploits.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
A zero-day vulnerability in Microsoft Windows may already have been exploited.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.