Zero-day vulnerability in Windows captured by our technologies
The Microsoft Windows vulnerability CVE-2018-8453, which was used in several attacks this summer, was detected proactively.
1144 articles
The Microsoft Windows vulnerability CVE-2018-8453, which was used in several attacks this summer, was detected proactively.
Case study: An analysis of insufficient safety practices at a small advertising agency.
Easy protection for complicated threats.
Forgotten online resources can be used for extortion or phishing
How businesses globally handle personally identifiable information.
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
Start protecting your network by stopping potential threats way before they can get too close — on the Internet gateway level.
Our Security Services folks published a report on the errors they see most — here they give advice on how to make your infrastructure more cyberresilient.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.
More than 400 manufacturing companies became phishing targets.
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
Fileless malware infects workstations and servers in corporate networks.
We created a new service that can provide a detailed dossier on any file Kaspersky Lab’s systems have encountered.
A month ago, Eugene Kaspersky wrote about an unfortunate situation involving a De Telegraaf journalist. The court has now ruled in our favor.
Some business owners see cyberprotection as just more software to manage. But it is much more than that.
Kaspersky Lab is contributing to project COMPACT to help local public administrations become more cyberresilient.
The recently leaked source code actually isn’t Carbanak — it’s another advanced financial malware family. And the leak will likely have a huge ripple effect.
The Rakhni encrypting ransomware, known since 2013, is now trying its hand at mining Monero.
Cybercriminals have realized that infecting servers is much more profitable than mining on home users’ computers.