
New tricks of the Trickbot Trojan
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals.
469 articles
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals.
Kaspersky’s Ask the Analyst service will ease access to our expertise.
On October’s Patch Tuesday, Microsoft patched 71 vulnerabilities, several of which are particularly serious.
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
How attackers are most apt to get into target companies’ infrastructure.
IT Security Economics 2021 report: Infosec’s top 5 challenges dealing with complex incidents.
At the SAS 2021 conference, our experts talked about the Tomiris backdoor, which appears to be linked to the DarkHalo group.
Cyberattacks most commonly rely on just a few common operating system components.
The Open Management Infrastructure agent, with four vulnerabilities, is being automatically installed on virtual Linux machines on Microsoft Azure.
Our first transparency report addresses requests from law enforcement agencies and government organizations worldwide.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Malefactors are looking for vulnerable Confluence servers and exploiting CVE-2021-26084, an RCE vulnerability.
Misconfigured applications built with Microsoft Power Apps leave millions of personally identifiable information entries exposed.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.
News reports of Linux threats have been increasingly frequent lately. Here’s what you can do about it.
Why using a corporate mail account for personal matters is not a good idea
Having a shared storage and data exchange environment can pose additional risks to corporate security.