Innovation in enterprise
Our new research explores the role innovation plays within large organizations, and where key decision makers see innovation going next.
1278 articles
Our new research explores the role innovation plays within large organizations, and where key decision makers see innovation going next.
Cybercriminals are using steganography to hide their code and seek industrial data.
Cybercriminals are employing a sophisticated malicious framework whose tools include some leaked from Hacking Team.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
Modern computerized car require a secure-by-design platform. And that’s just what we’ve come up with.
The mass transition to working from home clearly shows the best technologies for a secure and convenient remote environment.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
The DeathStalker group targets relatively small companies and their trade secrets.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
Our technologies prevented an attack. Expert analysis revealed the exploitation of two previously unknown vulnerabilities. What you need to know.