Business

1211 articles

Advanced cyberthreats, demystified

Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.

A license to hunt bugs

In the very near future, we will use the HackerOne platform to launch the Kaspersky Lab Bug Bounty program, which will give outside experts an opportunity to seek bugs in Kaspersky Lab’s products and be rewarded for vulnerabilities they might find.

Who’s protecting small and medium businesses?

Smart MSPs craft security software proposals for SMBs and offer security systems management services that eliminate the need for in-house information security specialists. Not every service provider is good for small companies, but the most successful MSPs are focused on this segment.

Dropping Elephant: Inelegant Espionage

An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government/diplomatic organizations – and also to foreign embassies and diplomatic offices in China.

Protecting the virtual desktops

Despite the persistent myth of security-by-default, virtual infrastructures need protection every bit as much as physical ones. Almost all existing threats are relevant for virtual machines, too.