Home Search

kaspersky - search results

If you're not happy with the results, please do another search
active directory

On ethics, morals, and information security

0
In the early noughties, the demand for IT professionals spiked in India. Becoming a software engineer and migrating to the United States was a...

Code Girls: The Bluestockings of Cybersecurity

0
The story dates to 1941, when mysterious letters appeared in the mailboxes of a few select students at Seven Sister colleges, seven liberal arts...
Konni Malware, North Korean threat actors target AstraZeneca

Lazarus Group Hits Defense Industries with “ThreatNeedle” Malware

0
Security experts found the North Korean-backed advanced persistent threat (APT) group Lazarus is targeting the defense industry across multiple countries since 2020. According to...
Cryptocurrency Lazarus, North Korean TA406, Lazarus Group , Korea Atomic Energy Research Institute

In Action: Lazarus Group Develops New AppleJeus Malware for Cryptocurrency Theft

0
Federal agencies are warning about potential cyber threats posed by the infamous North Korean hacking group Lazarus. In a joint advisory, the FBI, the...

SilentFade Social Media Malware Campaign Resurfaces; Indian Users Most Targeted

0
Security experts from Kaspersky found a 2016 social media malware campaign resurfacing, targeting millions of users across the world. This sophisticated social media malware...
web application attacks

How to Prevent Account Takeover Attacks

0
In tandem with improvements in digital financial services and e-commerce, threat actors have gotten more creative with account takeover attacks and scams. You could...
ransomware, ryuk ransomware, cox media

Ransomware Operators Exploit 2 CVEs in VMWare ESXi

0
Ransomware gangs are evolving every day. The latest trend suggests that they are after the backup servers or machines that contain backed up data....
decoding the SolarWinds hack, CISO MAG interview

Decoding the SolarWinds Hack

0
After Thanksgiving, the working class, especially the IT workforce, CISOs and CIOs, would have loved to sit back and sip on hot chocolate during...
remote desktop protocol (rdp)

What is an RDP attack?

0
Remote Desktop Protocol (RDP) attacks are becoming a nightmare for CISOs, CIOs, CTOs, and network administrators. They are an attack vector to enterprise networks....
FireEye’s Red Team tools breach

FireEye Discloses Breach and Theft of its Red Team Tools

0
Popular cybersecurity firm FireEye announced that it is a victim of a sophisticated state-sponsored cyberattack. In an official release, the company stated that the...

MOST POPULAR

RECENT POSTS