Independent testing of EDR solutions
SE Labs awarded Kaspersky EDR its highest rating in independent tests based on real world attacks.
760 articles
SE Labs awarded Kaspersky EDR its highest rating in independent tests based on real world attacks.
Episode 262 of the Transatlantic Cable includes UK TikTok woes, Twitter 0days, Meta in trouble and crypto-exchange sanctions!
Meet the new Kaspersky: We introduce our new product line and tell you about the improvements our home users can expect.
New malicious campaign hunts for Discord tokens and credit card information via infected npm packages.
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
One of the most complex, yet easy to understand, infosec studies of recent times.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
For this edition of the Kaspersky podcast, Ahmed, Jag and Jeff discuss Seth Green’s stolen Bored Ape, ransomware for good and more.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
The Department of Homeland Security is urging US federal agencies to “patch or remove” a list of VMware products within five days. Probably you should do it too.
May 2022 Introduction Ransomware, as the name suggests, is malicious software designed to block access to a computer system or encrypt its data until a sum of money (a ransom)
What to pay attention to as to minimize the outcome from cyberincidents in an industrial facility.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
HermeticRansom cryptor was used as a distraction to support HermeticWiper attacks.
Methods of reasonable protection against potential freelancer related cyberthreats.
Does hardware vulnerabilities in CPU pose a practical threat to businesses?