RSAC 2019: Why attackers need domain fronting
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
3298 articles
A story from RSAC 2019 on how domain fronting is used to disguise communications between an infected machine and a command server.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
In this episode of the Kaspersky Lab podcast, Dave and Jeff discuss the perils of downloading shows, like Game of Thrones, on torrents, Facebook calling for regulation, Toyota breaches, and more.
Our new version of Kaspersky Endpoint Security Cloud combines time-proven security technologies with the flexibility of a software-as-a-service model.
Commercial spying apps — stalkerware — are not malware in the proper sense of the term, but it’s better to avoid using them anyway.
Do you use plugins on your website? Make sure they are updated regularly.
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
A new protective technology will keep your ATM safe on the physical level and guarantee you additional income in cash.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
In this episode of the Kaspersky Lab podcast, Dave and Jeff take a look at a bad week for Facebook, a backdoor into ASUS, downed flights in the US, and more.
A bug in WinRAR allows malefactors to gain full control over your device. All they need you to do is unpack a rigged RAR file.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
Our technologies detected a threat that seems to be one of the biggest supply-chain attacks ever.
The latest on the Norsk Hydro ransomware plague, the EU preparing for EU-wide cyberattack, a snafu with Sprint, and more.
Do not expect data encrypted by ransomware to be restored easily. It is better to protect the data in the first place.
A new strain of Mirai is equipped with a much wider range of exploits, including some targeted at enterprise-class IoT devices.
Industrial Norwegian giant Hydro hit by ransomware — security incident analysis.