vulnerabilities

Outsmarting Malware

Outsmarting Malware

Cybersecurity can use adaptable machine learning algorithms combined with several anti-malware technologies to find and foil advanced threats.

Speed: Threats move fast. You have to move faster

Speed: Threats move fast. You have to move faster

Make sure your team can outrace the next cyber threat, with a threat detection and response solution that delivers the insights they need to see threats coming sooner and drive them off faster.

Visibility: If you can't see it, you can't stop it

Visibility: If you can't see it, you can't stop it

With mobile, cloud and the internet of things creating new openings for cyber threats, your organization is at greater risk than ever. So you need more visibility than ever to detect threats and respond to them effectively. 

Steganography in contemporary cyberattacks

Steganography in contemporary cyberattacks

A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules

DDoS attacks in Q2 2017

DDoS attacks in Q2 2017

Money remains the driving force of DDoS attacks.The growing interest in cryptocurrencies leads to an increase in their exchange-value in the second quarter of 2017.

Are you safeguarded against Ransomware?

Are you safeguarded against Ransomware?

Organizations need to play smart to prevent Ransomware attacks. Creating regular back-ups of your data will go a long way in your preparedness to tackling cyber-attacks.

RSA solutions to prevent undesired user behaviour

RSA solutions to prevent undesired user behaviour

Incorporating essential capabilities around visibility, analysis, and action into activities allows organizations to hunt out threats and be proactive about protecting their most valuable digital assets. 

Effective method to tackle Schroedinger's Pet(ya)

Effective method to tackle Schroedinger's Pet(ya)

After an analysis of the encryption routine of the malware used in the Petya/ExPetr attacks, it has been found that this malware campaign was designed as a wiper pretending to be ransomware. 

A comprehensive KSN Report: Ransomware in 2016-17

A comprehensive KSN Report: Ransomware in 2016-17

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period.

Load More