Podcast: #TheSAS2019 recap day 2
Jay Rosenberg of GReAT joins Jeff and Ahmed to recap the second day of the Security Analyst Summit in Singapore.
3313 articles
Jay Rosenberg of GReAT joins Jeff and Ahmed to recap the second day of the Security Analyst Summit in Singapore.
A new APT attack targets the diplomatic mission of an Asian country.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
In this episode of the Kaspersky Lab podcast, Jeff and Ahmed take a look at the first day of the Security Analyst Summit in Singapore.
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
In this episode of the Kaspersky Lab podcast, Dave and Jeff discuss the perils of downloading shows, like Game of Thrones, on torrents, Facebook calling for regulation, Toyota breaches, and more.
Our new version of Kaspersky Endpoint Security Cloud combines time-proven security technologies with the flexibility of a software-as-a-service model.
Do you use plugins on your website? Make sure they are updated regularly.
Commercial spying apps — stalkerware — are not malware in the proper sense of the term, but it’s better to avoid using them anyway.
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
In this episode of the Kaspersky Lab podcast, Dave and Jeff take a look at a bad week for Facebook, a backdoor into ASUS, downed flights in the US, and more.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.