Evaluating threat intelligence sources
To protect themselves, businesses need to take a proactive approach, constantly adapting their security controls to the ever-changing threat environment.
1211 articles
To protect themselves, businesses need to take a proactive approach, constantly adapting their security controls to the ever-changing threat environment.
Cybercriminals take control of corporate mail accounts to send filter-dodging spam.
Major areas of risk for initial coin offerings that you can and should address before selling a single token.
Three real-world examples to illustrate the dangers of digital clutter.
It appears the ASUS incident was just one part of the large-scale operation.
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Our proactive security technologies uncovered an attempt to exploit another zero-day vulnerability in win32k.sys.
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
A new APT attack targets the diplomatic mission of an Asian country.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
Our new version of Kaspersky Endpoint Security Cloud combines time-proven security technologies with the flexibility of a software-as-a-service model.
Do you use plugins on your website? Make sure they are updated regularly.
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.