How to build an effective SOC
Identifying key issues and choosing security solutions to address them.
57 articles
Identifying key issues and choosing security solutions to address them.
The source code of infamous, billion-dollar malware was found on VirusTotal. Here’s what we know about it and what to expect next.
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
Getting a job in cybersecurity, loving it, and keeping it.
We’ve got a multi-function cyber-X-ray in development, but some of its functionality can already be used right now.
To be successful, incident response has to be integrated with existing security solutions and should be powered by the threat detection solutions of the future.
Kaspersky Lab’s security experts released a detailed report on Operation Ghoul – a targeted campaign aimed primarily at businesses in the Middle East and Europe.
The modern rail system is basically a network of hundreds of different, but interconnected computers. Are these systems flawless security-wise?
Law enforcement agencies, with the help of leading IT security providers, are keen on blocking all the malware Command & Control servers they find. Sometimes, they efficiently shut down massive
These days, the propagation of zero-day exploits occurs almost literally at the speed of light. As soon as such useful exploit makes it to the public, APT authors can begin
Kaspersky Lab experts have investigated a new series of attacks by the Darkhotel cybercriminal group. Here are the details.
Securelist has published extensive research on BlackEnergy. Initially a DDoS crimeware, it turned into a huge collection of various tools currently used in various APT-type activities, including some “significant geopolitical operations”.
Big Data is widely used for security purposes, especially in the banking sphere. However, the amount of security-related data causes an issue of its own.
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?