PowerGhost: Beware of ghost mining
Fileless malware infects workstations and servers in corporate networks.
1278 articles
Fileless malware infects workstations and servers in corporate networks.
We created a new service that can provide a detailed dossier on any file Kaspersky Lab’s systems have encountered.
A month ago, Eugene Kaspersky wrote about an unfortunate situation involving a De Telegraaf journalist. The court has now ruled in our favor.
Some business owners see cyberprotection as just more software to manage. But it is much more than that.
Kaspersky Lab is contributing to project COMPACT to help local public administrations become more cyberresilient.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
Cybercriminals have realized that infecting servers is much more profitable than mining on home users’ computers.
Your data may move off-site, but does that mean you’re not responsible for it?
Targeted attacks are dangerous, but that doesn’t mean you should forget about threats that are more common.
The APT actor shows interest in finances and biochemical threat prevention and research.
A webinar on potential damage and the main risks associated with cloud breaches.
Kaspersky Lab filed a complaint for defamation against Dutch daily newspaper De Telegraaf and a Dutch politician
How to protect the financial accounts of your clients without scaring them away.
For the last few years, ransomware has been evolving into a sophisticated cyberweapon. You need cutting-edge technologies to stop it.
An online summit with industry leaders on the future of cybersecurity.
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
Implementing effective cybersecurity technologies does not equal GDPR compliance, but it is among the cornerstones on which this compliance is built.
A small infographic to remind you what GDPR is and what businesses can do to boost personal data security.
A traditional approach to cybersecurity is no longer good enough. Dealing with advanced threats requires advanced tools such as endpoint detection and response.