Vulnerability detected in Kernel Transaction Manager
Thanks to our proactive technologies, zero-day vulnerability CVE-2018-8611 was neutralized.
126 articles
Thanks to our proactive technologies, zero-day vulnerability CVE-2018-8611 was neutralized.
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
Our statistics show that WannaCry, far from fading away, was responsible for 30% of ransomware attacks in Q3 2018.
Case study: An analysis of insufficient safety practices at a small advertising agency.
Remote Administration Tools in ICS environment are an additional risk factor, and not necessarily a justified one.
How businesses globally handle personally identifiable information.
Our Security Services folks published a report on the errors they see most — here they give advice on how to make your infrastructure more cyberresilient.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
We created a new service that can provide a detailed dossier on any file Kaspersky Lab’s systems have encountered.
Kaspersky Lab is contributing to project COMPACT to help local public administrations become more cyberresilient.
Cybercriminals have realized that infecting servers is much more profitable than mining on home users’ computers.
Targeted attacks are dangerous, but that doesn’t mean you should forget about threats that are more common.
The APT actor shows interest in finances and biochemical threat prevention and research.
A webinar on potential damage and the main risks associated with cloud breaches.
How to protect the financial accounts of your clients without scaring them away.
For the last few years, ransomware has been evolving into a sophisticated cyberweapon. You need cutting-edge technologies to stop it.
Ten mistakes that led to the destruction of the Death Star.
Insights from RSA on how to hunt threats in corporate infrastructure