vulnerabilities

Steganography in contemporary cyberattacks

Steganography in contemporary cyberattacks

A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules

DDoS attacks in Q2 2017

DDoS attacks in Q2 2017

Money remains the driving force of DDoS attacks.The growing interest in cryptocurrencies leads to an increase in their exchange-value in the second quarter of 2017.

Are you safeguarded against Ransomware?

Are you safeguarded against Ransomware?

Organizations need to play smart to prevent Ransomware attacks. Creating regular back-ups of your data will go a long way in your preparedness to tackling cyber-attacks.

RSA solutions to prevent undesired user behaviour

RSA solutions to prevent undesired user behaviour

Incorporating essential capabilities around visibility, analysis, and action into activities allows organizations to hunt out threats and be proactive about protecting their most valuable digital assets. 

Effective method to tackle Schroedinger's Pet(ya)

Effective method to tackle Schroedinger's Pet(ya)

After an analysis of the encryption routine of the malware used in the Petya/ExPetr attacks, it has been found that this malware campaign was designed as a wiper pretending to be ransomware. 

A comprehensive KSN Report: Ransomware in 2016-17

A comprehensive KSN Report: Ransomware in 2016-17

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period.

What makes identity-driven security the new age firewall

What makes identity-driven security the new age firewall

Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.

Cybersecurity in healthcare: It's just not enough

Cybersecurity in healthcare: It's just not enough

A recent finding revealed that Indian healthcare companies are spending less than 6 percent of the total IT budget on cybersecurity. Given the spate of recent cybersecurity attacks bringing the industry to its knees, is the healthcare sector a sitting duck for cyber thugs?

Load More