Business benefits of secure containerization
What benefits do hybrid clouds and containerization bring to businesses — and what measurable impact do cybersecurity tools make?
778 articles
What benefits do hybrid clouds and containerization bring to businesses — and what measurable impact do cybersecurity tools make?
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
What network-security and access-control tools do the world’s top cyber-regulators recommend to companies?
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
European researchers have discovered a vulnerability in AMD processors that can be exploited by modifying RAM modules.
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
How to estimate what and how much hardware will be needed for a SIEM system to assess the costs before deployment?
The best privacy-focused services that make practical gifts for friends and family.
Kaspersky specialists, in collaboration with external experts, have formulated some key guidelines for safe and legal use of AI.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
What IT and cybersecurity leaders need to know about implementing network detection and response.
Detection of tactics involving malicious DLL registration and other Kaspersky SIEM improvements in Q4 2024.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.