Outdated Cisco equipment under threat from firmware
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
1208 articles
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
How a recently discovered bug in Intel processors threatens cloud providers.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
SOC Experts Victor Sergeev and Ahmed Khlief demonstrate the differences between compromise assessment, incident response, penetration testing, and MDR.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
Four handy ways to lock your screen on Windows and macOS.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
We explore some common misconceptions about the development and application of Cyber Immune products based on KasperskyOS.
Four major studies presented by our experts at the SAS 2023 international conference.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
How and why did American researchers try to extract sound from a video signal, and was it worth it?
We take an in-depth look at securing and configuring containerization systems.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
We look at a new sophisticated attack on AMD and Intel integrated graphics cards.
How to choose a secure mobile platform for work.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
How to protect a company’s reputation from illegal use of its name on the internet.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.