Surviving a digital transformation
Webinar on how to protect your business in the changing digital world
115 articles
Webinar on how to protect your business in the changing digital world
In today’s podcast, Jeff sits down with Santiago Pontiroli from Kaspersky Lab’s GReAT to discuss the happenings of the second day of the SAS 2016.
One of the most sophisticated APT campaigns ever analyzed by our experts.
Who hacked the Olympics? How can malware spread over routers? And what’s Sofacy up to?
Experts from Kaspersky Lab studied digital evidence related to the hacking attack on the 2018 Olympics in search of the actual attacker.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
Kaspersky Lab publishes an update on Russian-speaking Sofacy APT activity in 2017
The story of Kaspersky Lab’s alleged misdeeds is juicy — let’s check out how this fiction is made.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Most modern, enterprise-level companies understand the menace of cyberthreats to business. Some of them have tried to solve cybersecurity problems with the help of system administrators and security software, but
In October 2017, Kaspersky Lab initiated a thorough review of our telemetry logs in relation to alleged 2015 incidents described in the media. These are the preliminary results.
After more than a year of investigation, our experts have a thorough understanding of the Lazarus campaign and advice for protection.
A possible connection between Moonlight Maze, an APT that targeted the Pentagon and NASA in the late 1990s, and Turla, a modern day threat actor.
Kaspersky Lab’s security experts released a detailed report on Operation Ghoul – a targeted campaign aimed primarily at businesses in the Middle East and Europe.
Cyberweapons have to communicate to their creators, propagate within the infrastructure and send data. That’s when an effective and highly flexible algorithm can be capable of spotting them.
ProjectSauron is obviously a costly attack, but the budget is not invested in ‘rocket science’, but rather in the ‘bugfixing’ after the previous APT campaigns.
An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government/diplomatic organizations – and also to foreign embassies and diplomatic offices in China.
It now appears the number of servers bought and sold via xDedic might have been underestimated; it’s likely many more IPs have been compromised by xDedic players.