RSAC 2019: Grand Theft DNS
Credit to Author: Alex Drozhzhin| Date: Fri, 29 Mar 2019 15:23:59 +0000
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Read moreCredit to Author: Alex Drozhzhin| Date: Fri, 29 Mar 2019 15:23:59 +0000
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Read moreCredit to Author: Sergey Golubev| Date: Thu, 28 Mar 2019 22:16:38 +0000
Hundreds of thousands of tokens and cryptographic keys have been discovered on GitHub. We explain why this is bad and how to avoid a leak.
Read moreCredit to Author: Nikolay Pankov| Date: Wed, 27 Mar 2019 20:42:52 +0000
Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.
Read moreCredit to Author: Alex Drozhzhin| Date: Tue, 26 Mar 2019 12:37:56 +0000
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Read moreCredit to Author: Bender the Robot| Date: Mon, 25 Mar 2019 13:07:35 +0000
Our technologies detected a threat that seems to be one of the biggest supply-chain attacks ever.
Read moreCredit to Author: Kaspersky Team| Date: Wed, 20 Mar 2019 11:00:31 +0000
Do not expect data encrypted by ransomware to be restored easily. It is better to protect the data in the first place.
Read moreCredit to Author: Alex Perekalin| Date: Tue, 19 Mar 2019 19:20:32 +0000
Industrial Norwegian giant Hydro hit by ransomware — security incident analysis.
Read moreCredit to Author: Pavel Shoshin| Date: Thu, 14 Mar 2019 13:35:39 +0000
Our proactive technologies detected yet another Windows exploit that was used in APT attacks.
Read more