GitHub key leaks and how to prevent them
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
666 articles
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Our technologies detected a threat that seems to be one of the biggest supply-chain attacks ever.
Do not expect data encrypted by ransomware to be restored easily. It is better to protect the data in the first place.
A new strain of Mirai is equipped with a much wider range of exploits, including some targeted at enterprise-class IoT devices.
Industrial Norwegian giant Hydro hit by ransomware — security incident analysis.
Our proactive technologies detected yet another Windows exploit that was used in APT attacks.
Despite the plunge in cryptocurrency values, not only has cryptojacking not declined, it is growing rapidly.
The hidden dangers of out-of-office messages.
Mobile World Congress 2019 recapped: 5G, Internet of Things, ultrasonic fingerprint sensors, and artificial intelligence.
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
At Mobile World Congress 2019, our experts presented a study on the security of Motorica smart artificial limbs.
We detect a spike in activity from Trojans targeting mostly accountants who work in small and midsize businesses.
The process is undoubtedly underway, but it is going much slower than enthusiasts like to think.
Using only publicly available sources, how much can you find out about someone?
Cybercriminals are bypassing mail spam filters by hiding documents with a malicious link in SharePoint Online.
Our new partner program: What customers should know about Kaspersky United.
Burnout caused by routine is a problem not only for employees, but for the entire company.
Ex-employees can go to extremes for the sake of revenge. How to terminate a work relationship safely and securely.
Employees going away for the winter break? We explain what to do to keep trips from turning into corporate data leaks.