• Post Of The Day
  • Business
  • Enterprise
  • SMB

Trojan-stealer discovered in spam mailouts to businesses

Cybercriminals are sending to companies high-quality imitations of business letters to with a spy trojan…

  • News

Transatlantic Cable podcast, episode 268

Episode 268 of the Transatlantic Cable includes chess shocks, GTA6 breach, antivax carrots and IHG…

  • Threats

Harly: another Trojan subscriber on Google Play

We explain how the Harly Trojan subscriber targets Android users.

  • Business
  • Enterprise

Kaspersky Transparency Initiative update, September 2022

Introducing our new Transparency Center format and the opening of two more facilities in Europe.

  • Business
  • Enterprise
  • Products

Introducing: Kaspersky EDR Optimum

Kaspersky Endpoint Detection and Response Optimum – superior enterprise-cybersecurity, with no fluff.

  • News

Transatlantic Cable podcast, episode 267

Episode 267 of the Transatlantic Cable includes Meta engineers unsure where data goes, Lazarus, bank…

  • News
  • Threats

Where did that game cheats video on your YouTube channel come from?

The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts…

  • Business
  • Enterprise
  • SMB
  • Threats

Patches for 64 vulnerabilities in Microsoft products released

It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components…

  • Business
  • Enterprise
  • SMB

Weaponizing game code to attack a company

An unusual case of an attack executed by weaponizing legit video game code.

  • Threats

Browser extensions: more dangerous than you think

Using the most common families of malicious extensions as an example, we explain what can…

  • News

Transatlantic Cable podcast, episode 266

Episode 266 of the Transatlantic Cable includes TikTok data breaches, Samsung and Meta woes, and…

  • Business
  • Enterprise
  • SMB

A Zoom vulnerability, and the war between the hackers and the developers

Takeaway from DEF CON 30: vulnerability in Zoom for macOS.

  • Business
  • Enterprise

Hot off the press: a new study into “the nature of cyber incidents”

Highlights from "The nature of cyber incidents" report by the Kaspersky GERT team.

  • Business
  • Enterprise

Three approaches to structuring and alert processing in a SOC

How to distribute SOC tasks to tackle both the cybersecurity skills shortage and burnout.

  • News

Transatlantic Cable Podcast Episode 265

From an ex-Twitter exec blowing the whistle to Janet Jackson’s song crashing hard drives –…

  • Privacy

“To pop, or not to pop — that is the question”

How things are privacy-wise on the social network Poparazzi.

  • Business
  • Enterprise

How to reduce the load on SIEM and make good use of threat-intelligence feeds

How a threat-intelligence platform helps SOC analysts.

  • Products
  • Tips

Six ways to steal your password

We explain how attackers can steal your credentials and how you can prevent it.

  • News

Transatlantic Cable Podcast Episode 264

From Airbnb new anti-party tech to going back to jail for ordering McDonalds' – it’s…

  • Privacy

Signal is secure, as proven by hackers

Users of the Signal messaging app got hit by a hacker attack. We analyze what…

  • Business
  • Enterprise
  • SMB

The chronicle of WannaCry

Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Read More