How to detect FortiCloud SSO authentication bypass
Kaspersky SIEM got a set of correlation rules for detecting attempts to exploit vulnerabilities for authentication bypass in Fortinet products.
1388 articles
Kaspersky SIEM got a set of correlation rules for detecting attempts to exploit vulnerabilities for authentication bypass in Fortinet products.
Why is it useful to attribute malware to a specific hacker group?
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?
Crooks are impersonating your brand to attack customers, partners, and employees. How do you spot — and stop — an attack of the clones?
Who can you trust in the cybersecurity solutions market? Fourteen major vendors were compared in terms of transparency, security management, and data-handling practices – and guess which was a leader across the board?!…
Cybercriminals are distributing malware that deploys an infostealer and masks its activity in network and system logs.
GReAT experts have analyzed a new targeted campaign by the ForumTroll APT group.
How to eliminate the threat posed to organizations by ownerless servers and services, outdated libraries, and insecure APIs.
How automation turns legitimate tools into a channel for malware delivery.
Millions of websites based on React and Next.js contain an easy-to-exploit vulnerability that can lead to complete server takeover. How to check if your server is vulnerable, and protect corporate web assets?
Identifying threats to embedded devices, and how the updated Kaspersky Embedded Systems Security can help in tackling them?
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.
Systematic measures and tools that organizations can use to defend against malicious browser extensions.
We examine how popular Canon printers could become a foothold for attackers within an organization’s network.
Malicious actors have started utilizing a new variation of the ClickFix technique — named “FileFix”. We explain how it works, and how to defend your company against it.
How organizations save employee time and boost productivity with the new version of Kaspersky SD-WAN.
The differences between an MXDR service for a large enterprise, and one that would fit perfectly into the security framework of a growing SMB.
Two campaigns by the BlueNoroff APT group target developers and executives in the crypto industry.
Our experts have found common tools used by both the ForumTroll APT group and attackers using Dante malware by Memento Labs.