Rakhni Trojan: To encrypt and to mine
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
657 articles
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
Cybercriminals have realized that infecting servers is much more profitable than mining on home users’ computers.
Targeted attacks are dangerous, but that doesn’t mean you should forget about threats that are more common.
The APT actor shows interest in finances and biochemical threat prevention and research.
A webinar on potential damage and the main risks associated with cloud breaches.
How to protect the financial accounts of your clients without scaring them away.
For the last few years, ransomware has been evolving into a sophisticated cyberweapon. You need cutting-edge technologies to stop it.
Implementing effective cybersecurity technologies does not equal GDPR compliance, but it is among the cornerstones on which this compliance is built.
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
This new version of SynAck ransomware uses sophisticated evasion techniques.
How can we get prepared for the decryption capabilities of upcoming quantum computers?
Ten mistakes that led to the destruction of the Death Star.
See a few highlights from the RSA Conference 2018 in San Francisco.
Insights from RSA on how to hunt threats in corporate infrastructure
Protecting a hybrid infrastructure from a single console
How to safeguard your solution and clients with time-tested technologies.
How Kaspersky Endpoint Security for Business counters the latest threats.
Revealing the pros and cons of MSPs.
A cloud instrument for detailed malware activity analysis.