• Post Of The Day
  • News

Transatlantic Cable podcast, episode 257

Episode 257 of the Kaspersky podcast includes hacking ships and planes, lost USB sticks in…

  • Threats

“Package for you. Please scan the QR code”

How cybercriminals extract bank card details pretending to be DHL.

  • Business
  • Enterprise
  • SMB

A mind of their own: we need to talk about neuroprocessors

Why the future belongs to neuromorphic processors, and how they differ from conventional processors in…

  • Business
  • SMB

Five reasons to protect small business from cyberthreats

Five arguments in favor of installing security solutions on the endpoints of a small company.

  • Business
  • Enterprise

Techniques, tactics and procedures of ransomware

Deep analysis of modern ransomware allows you to implement universal methods to counter them.

  • News

$2 million inventory hacked in CS:GO

An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s…

  • News

Transatlantic Cable podcast, episode 256

From Metal Gear Solid 2 to “BidenCash” and NFTs, it’s episode 256 of the Transatlantic…

  • Business
  • Enterprise

Combating data leaks through database encryption

Queryable Encryption in the MongoDB database management system, and how it can improve data protection.

  • Special Projects

Valter Generoso: “Be in the shoes of those who are facing the problem”

Meet Valter Generoso, Technical Account Manager at Kaspersky Latin America.

  • Business
  • Enterprise
  • SMB

Initial access market analysis

Our experts studied the shadow market for initial access to corporate infrastructure.

  • News

Transatlantic Cable podcast, episode 255

From possible sentient AI to leaky stalkerware and digital doubles – it’s episode 255 of…

  • Privacy

Let’s stand up for privacy!

We explain how to best secure your Vivino profile.

  • Business
  • Enterprise

Interns: a hidden cybersecurity threat

How an intern can be a threat to your organization’s cybersecurity and what you can…

  • Business
  • Enterprise

Most prevalent adversarial techniques applied in 2021 incidents

Kaspersky Managed Detection and Response experts identified the adversarial techniques that were most prevalent cybersecurity…

  • News

Transatlantic Cable podcast, episode 254

For this edition of the Kaspersky podcast, Ahmed, Jag and Jeff discuss an app that…

  • Threats
  • Tips

The hidden threats of router malware

Malware can infect your router, slow down the internet connection and steal data. We explain…

  • Technology
  • Threats

Hacking a powered-off iPhone: vulnerabilities never sleep

Can a device be hacked when switched off? Recent studies suggest so. Let’s see how…

  • Business
  • Enterprise

WinDealer: spyware with a peculiar delivery mechanism

Our experts studied the WinDealer malware created by the LuoYu APT group.

  • News

Transatlantic Cable podcast, episode 253

For this edition of the Kaspersky podcast, Ahmed, Jag and Jeff discuss Seth Green’s stolen…

  • Threats

Phishing for Wise guys

Here’s how phishers extract phone numbers and credentials from users of Wise.

  • Tips

Learn your kid’s language

Studying search queries popular with kids will help you start speaking your kid’s language.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Read More