Microsoft Office and its vulnerabilities
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
201 articles
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
Do you use plugins on your website? Make sure they are updated regularly.
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Systems designed to guard against car theft can be used to track, immobilize, and steal vehicles.
Our proactive technologies detected yet another Windows exploit that was used in APT attacks.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?
Let’s talk about mobile malware that can empty your bank account or spy on you.
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…
Did you see that new fully loaded Android smartphone, the one that looks too good for the price? Well, it may include some unwanted extras.
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
Kaspersky Lab is expanding its successful bug bounty program to include rewards of up to $100,000.
A vivid example of why we need to strengthen IoT security — and a solution to the problem.
Cybercriminals attack Telegram users with an old trick for masking malware as pictures.
Researchers at our ICS CERT discovered a number of vulnerabilities in the Sentinel solution, so users are advised to update the drivers immediately