Quantcast
Channel: supply chain – Kaspersky official blog
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

RSA Conference 2018 trends

We’re back from RSA Conference 2018 and want to share with you our impressions on what’s important for the industry. Of course, we couldn’t attend every talk and session or explore every corner of the...

View Article



Image may be NSFW.
Clik here to view.

Common SMB mistakes: The supply-chain attack

Bill doesn’t like morning calls. It’s not that he’s lazy; he just thinks that work should begin once one’s emotional balance has been restored after the mayhem of the morning commute — and certainly...

View Article

Image may be NSFW.
Clik here to view.

A bad link in the cryptochain

Pretty much every developer uses some third-party libraries — with millions of developers sharing their creations with the world, leveraging existing modules to help solve your tasks is a smart use of...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity report from Middle-earth

What do Tolkien’s works say? Some read them as entertainment, others as profound Christian philosophy, still others as propaganda. As for me, I see cybersecurity parables. And just because these past...

View Article

Image may be NSFW.
Clik here to view.

ShadowHammer: Malicious updates for ASUS laptops

Thanks to a new technology in our products that is capable of detecting supply-chain attacks, our experts have uncovered what seems to be one of the biggest supply-chain incidents ever (remember...

View Article


Image may be NSFW.
Clik here to view.

Transatlantic Cable podcast, episode 84

Facebook made it right to the top of the 84th edition of the Kaspersky Lab Transatlantic Cable podcast. We kick off with the latest in the saga between Facebook and Cambridge Analytica; according to...

View Article

Image may be NSFW.
Clik here to view.

Potential problems with third-party Web plugins

Online stores, information portals, and other resources are often based on platforms that provide developers with a set of ready-made tools. Our blog, for example, is built along those lines. Features...

View Article

Image may be NSFW.
Clik here to view.

ShadowHammer: New details

In our previous post about operation ShadowHammer, we promised more details. Although investigation is still in progress, our researchers are ready to share new details about this sophisticated...

View Article


Image may be NSFW.
Clik here to view.

Supply chain as SMB threat

Small business owners may think their companies are too insignificant to become a target for cybercriminals. There is a certain logic in that: Attackers look for maximum profit from minimum effort. But...

View Article


Image may be NSFW.
Clik here to view.

“Puss in Boots” APT campaign

Have you ever thought about what your answer would be if your precocious child asked, “What’s a politically motivated APT attack?” In fact, it’s straightforward. Just dust off your copy of Charles...

View Article

Kaspersky at the Internet Governance Forum | Kaspersky official blog

As the Internet approaches its fourth decade, it’s worth remembering that in that short amount of time, we’ve seen monumental, global change — both in the real world and, of course, in the digital one....

View Article

PHP language backdoor | Kaspersky official blog

Unknown attackers recently attempted to carry out a large-scale supply-chain attack by introducing malicious code to the official PHP GIT repository. If the developers hadn’t noticed the backdoor in...

View Article

UAParser.js package infected with password stealer and miner

Unknown attackers have compromised several versions of a popular JavaScript library, UAParser.js, by injecting malicious code. According to statistics on the developers’ page, many projects use the...

View Article


Image may be NSFW.
Clik here to view.

Trojan Source: Hidden source code implants | Kaspersky official blog

University of Cambridge experts described a vulnerability they say affects most modern compilers. A novel attack method uses a legitimate feature of development tools whereby the source code displays...

View Article

Image may be NSFW.
Clik here to view.

Potential consequences of Okta hack | Kaspersky official blog

Hackers belonging to the LAPSUS$ cybercrime group have published screenshots, allegedly taken from inside Okta’s information systems. If the claims are true, they have access not only to the company’s...

View Article


Five reasons to protect small business from cyberthreats | Kaspersky official...

Small business owners often believe that their companies are not all that interesting as targets for cybercriminals. Indeed, on the one hand, there is less potential benefit for the cybercriminals from...

View Article

Image may be NSFW.
Clik here to view.

LofyLife: malicious packages in npm repository | Kaspersky official blog

Open-source code is a blessing for the IT industry — it helps programmers save time and build products faster and more efficiently by eliminating the need of writing repetitive common code. To...

View Article


Supply chain attack on 3CX customers | Kaspersky official blog

Various media sources are reporting a mass supply-chain attack targeting 3CX VoIP telephony system users. Unknown attackers have managed to infect 3CX VoIP applications for both Windows and macOS. Now...

View Article

Where Linux is in your home, and how to protect Linux devices from hacking |...

Over the first 23 years of this century, the Linux operating system has become as ubiquitous as Windows. Although only 3% of people use it on their laptops and PCs, Linux dominates the Internet of...

View Article

How to protect corporate routers and firewalls against hacking | Kaspersky...

Devices on the border between the internet and an internal corporate network — especially those responsible for security and network traffic management — are often a priority target for attackers. They...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images