The Beekeeper and cybersecurity | Kaspersky official blog
Credit to Author: Nikolay Pankov| Date: Mon, 01 Apr 2024 10:31:18 +0000
What cybersecurity lessons can we learn from the Jason Statham movie "The Beekeeper"?
Read moreCredit to Author: Nikolay Pankov| Date: Mon, 01 Apr 2024 10:31:18 +0000
What cybersecurity lessons can we learn from the Jason Statham movie "The Beekeeper"?
Read moreCredit to Author: Editorial Team| Date: Sun, 31 Mar 2024 19:40:31 +0000
Vulnerability CVE-2024-3094. The attackers implanted a backdoor into the compression utilities set XZ Utils versions 5.6.0 and 5.6.1.
Read moreCredit to Author: Stan Kaminsky| Date: Fri, 22 Mar 2024 16:39:46 +0000
What measures should IT and InfoSec services take to “harden” against LotL attacks that leverage LOLBins and LOLBAS?
Read moreCredit to Author: Alanna Titterington| Date: Thu, 21 Mar 2024 19:43:39 +0000
We discuss commercial spyware — particularly the capabilities of the most well-known instances: Pegasus, DevilsTongue, Predator, Subzero, Heliconia, and Reign.
Read moreCredit to Author: Amanda Hoover| Date: Wed, 20 Mar 2024 09:00:00 +0000
Anonymous, candid reviews made Glassdoor a powerful place to research potential employers. A policy shift requiring users to privately verify their real names is raising privacy concerns.
Read moreCredit to Author: Alanna Titterington| Date: Mon, 18 Mar 2024 18:08:43 +0000
We explain what SIM swapping is, how such attacks can hurt organizations, and how to guard against them.
Read more