RSA Conference 2018 trends
We’re back from RSA Conference 2018 and want to share with you our impressions on what’s important for the industry. Of course, we couldn’t attend every talk and session or explore every corner of the...
View ArticleCommon SMB mistakes: The supply-chain attack
Bill doesn’t like morning calls. It’s not that he’s lazy; he just thinks that work should begin once one’s emotional balance has been restored after the mayhem of the morning commute — and certainly...
View ArticleA bad link in the cryptochain
Pretty much every developer uses some third-party libraries — with millions of developers sharing their creations with the world, leveraging existing modules to help solve your tasks is a smart use of...
View ArticleCybersecurity report from Middle-earth
What do Tolkien’s works say? Some read them as entertainment, others as profound Christian philosophy, still others as propaganda. As for me, I see cybersecurity parables. And just because these past...
View ArticleShadowHammer: Malicious updates for ASUS laptops
Thanks to a new technology in our products that is capable of detecting supply-chain attacks, our experts have uncovered what seems to be one of the biggest supply-chain incidents ever (remember...
View ArticleTransatlantic Cable podcast, episode 84
Facebook made it right to the top of the 84th edition of the Kaspersky Lab Transatlantic Cable podcast. We kick off with the latest in the saga between Facebook and Cambridge Analytica; according to...
View ArticlePotential problems with third-party Web plugins
Online stores, information portals, and other resources are often based on platforms that provide developers with a set of ready-made tools. Our blog, for example, is built along those lines. Features...
View ArticleShadowHammer: New details
In our previous post about operation ShadowHammer, we promised more details. Although investigation is still in progress, our researchers are ready to share new details about this sophisticated...
View ArticleSupply chain as SMB threat
Small business owners may think their companies are too insignificant to become a target for cybercriminals. There is a certain logic in that: Attackers look for maximum profit from minimum effort. But...
View Article“Puss in Boots” APT campaign
Have you ever thought about what your answer would be if your precocious child asked, “What’s a politically motivated APT attack?” In fact, it’s straightforward. Just dust off your copy of Charles...
View ArticleKaspersky at the Internet Governance Forum | Kaspersky official blog
As the Internet approaches its fourth decade, it’s worth remembering that in that short amount of time, we’ve seen monumental, global change — both in the real world and, of course, in the digital one....
View ArticlePHP language backdoor | Kaspersky official blog
Unknown attackers recently attempted to carry out a large-scale supply-chain attack by introducing malicious code to the official PHP GIT repository. If the developers hadn’t noticed the backdoor in...
View ArticleUAParser.js package infected with password stealer and miner
Unknown attackers have compromised several versions of a popular JavaScript library, UAParser.js, by injecting malicious code. According to statistics on the developers’ page, many projects use the...
View ArticleTrojan Source: Hidden source code implants | Kaspersky official blog
University of Cambridge experts described a vulnerability they say affects most modern compilers. A novel attack method uses a legitimate feature of development tools whereby the source code displays...
View ArticlePotential consequences of Okta hack | Kaspersky official blog
Hackers belonging to the LAPSUS$ cybercrime group have published screenshots, allegedly taken from inside Okta’s information systems. If the claims are true, they have access not only to the company’s...
View ArticleFive reasons to protect small business from cyberthreats | Kaspersky official...
Small business owners often believe that their companies are not all that interesting as targets for cybercriminals. Indeed, on the one hand, there is less potential benefit for the cybercriminals from...
View ArticleLofyLife: malicious packages in npm repository | Kaspersky official blog
Open-source code is a blessing for the IT industry — it helps programmers save time and build products faster and more efficiently by eliminating the need of writing repetitive common code. To...
View ArticleSupply chain attack on 3CX customers | Kaspersky official blog
Various media sources are reporting a mass supply-chain attack targeting 3CX VoIP telephony system users. Unknown attackers have managed to infect 3CX VoIP applications for both Windows and macOS. Now...
View ArticleWhere Linux is in your home, and how to protect Linux devices from hacking |...
Over the first 23 years of this century, the Linux operating system has become as ubiquitous as Windows. Although only 3% of people use it on their laptops and PCs, Linux dominates the Internet of...
View ArticleHow to protect corporate routers and firewalls against hacking | Kaspersky...
Devices on the border between the internet and an internal corporate network — especially those responsible for security and network traffic management — are often a priority target for attackers. They...
View Article
More Pages to Explore .....