MTFBWY The Bad Batch: Tantiss base security Cybersecurity measures of Tantiss base as depicted in the third season of “Star Wars: The Bad Batch”
MTFBWY Cybersecurity in season 3 of The Mandalorian As per tradition, on May 4, we review the status of cybersecurity in a galaxy far, far away.
truth Obi-Wan Kenobi in terms of information security How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
access Initial access market analysis Our experts studied the shadow market for initial access to corporate infrastructure.
PII Do you know how your employees are processing PII? Can you be sure your employees are working responsibly with personally identifiable information?
truth Hans Christian Andersen on security technologies Our Danish colleague spilled a lot of cybersecurity ink in his works.
truth The Matrix Resurrections security assessment A look at what’s changed in the Matrix in the 18 years since the last update.
truth Matrix vulnerabilities Even to the naked eye, the Matrix’s flawed implementation threatens the system’s stability and security.
vulnerabilities Critical vulnerability in Apache Log4j library Researchers discovered a critical vulnerability in Apache Log4j library, which scores perfect 10 out of 10 in CVSS. Here’s how to protect against it.
truth Cybersecurity in 007’s world What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
supply chain Popular JavaScript package UAParser.js infected with malware Npm package UAParser.js, installed on tens of millions of computers worldwide, has been infected with a password stealer and a miner. Here’s what to do.
truth Information security in Dune We take a look at information security practices on planet Arrakis.
cybersecurity awareness Information security guide for new employees To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
truth Tolkien’s dwarves and their cybersecurity technologies Examples of the cybersecurity technologies and practices of Durin’s folk abound in Tolkien’s Middle-earth.
social media Evil brand twins on Twitter How to protect your clients from cybercriminals impersonating your company on Twitter.
social engineering How to dispose of corporate trash properly Many companies throw out information that can pose a security or reputational risk.
cybersecurity awareness VR for industrial cybersecurity training Now available in a virtual reality format: Kaspersky Interactive Protection Simulation’s power-plant protection scenario. How can it help your business?
vulnerabilities PuzzleMaker: Targeted attacks against multiple companies Our technologies detected targeted attacks involving a number of zero-day exploits.
RSA conference Protect networked IoT devices or protect the network from IoT devices? IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
RSA conference Routers prove weak point in remote-work strategy Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.