intrusion

Clash of Greed

Clash of Greed

Learn how fraudsters are using popular games like Clash of titalns to carry out phising attacks on the player base.

Planning for Chaos

Planning for Chaos

The industry is shifting from focusing on cybersecurity as a technology problem, to cybersecurity as a business problem. Organizations must change their strategy and plan for chaos, instead of anticipating its arrival.

Features of secure OS realization

Features of secure OS realization

KasperskyOS aims to protect software and data systems from the consequences of the intrusion of malicious code, viruses and hacker attacks.

Breaking The Weakest Link Of The Strongest Chain

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server.

Security 101: Business Process Compromise

Security 101: Business Process Compromise

Business Process Compromise (BPC) is a type of attack where hackers infiltrate an enterprise and look for vulnerable practices, susceptible systems, or operational loopholes.

Load More