SECURITY THREATS

Not a day passes without news of another major data breach, and with the stakes rising – from data loss to regulatory penalties that could put an organization out of business – the cost of doing nothing may soon exceed the cost of adequate security measures. We keep you informed of the latest ways that cybercriminals are attacking organizations, and keep you informed of the best practices and security technologies that will keep your data safe from hackers.

LATEST SECURITY THREATS ARTICLES

Honda Plant Shut Down by Ransomware Attack

|

Competitors Nissan and Renault were also forced to stop production last month, Reuters reports.

READ MORE

Stack Clash Vulnerability Exploits Linux Stack Guard

|

Security firm Qualys discovers flaws in the Linux kernel and glibc library, that fortunately have not been exploited in the wild by attackers - yet

READ MORE

Financial Institutions Report Surge in Fraud

|

To handle the threat of fraud, 24 percent of corporations plan to increase their spending on fraud prevention, detection and controls.

READ MORE

Malware Behind Ukraine Blackout Analyzed

|

According to Dragos researchers, the Ukraine attack seems to have been 'more of a proof of concept than what was fully capable in the malware.'

READ MORE

Massive Surge in Botnet Malware Activity in Q1 2017

|

At the same time, ransomware usage dropped by 44.9 percent.

READ MORE

TOP SECURITY THREATS RESOURCES

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

READ MORE

TYPES OF MALWARE

Here are some of the most common malware types and how to defend against them, from adware to worms and everything in between.

READ MORE

THREAT INTELLIGENCE AND ANALYTICS

We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

READ MORE

CYBER INSURANCE

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

NSS Labs: Advanced Endpoint Protection Test Report

The ultimate goal of any attack on a computer system is to gain access to a target host and perform an unauthorized action, which results in the compromise of an asset or data. Intruders may use several techniques to circumvent these levels of protection, such as targeting vulnerable …

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …

Business Perception of IT Security: In the Face of Inevitable Compromise

To investigate cyber threat landscape perception and reality, Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries. We asked businesses about their perceptions of the main security threats they face and the …
 
SEE ALL WHITEPAPERS
 
Russian Hackers Hit 122 U.S. Election Officials Days Before 2016 Election

Russian Hackers Hit 122 U.S. Election Officials Days Before 2016 Election

|

The officials were targeted with spear phishing emails that claimed to provide documentation for an e-voting system.

READ MORE
OneLogin Password Manager Hacked

OneLogin Password Manager Hacked

|

All customers served by the company's U.S. data center are affected.

READ MORE
Hackers Return to Kmart

Hackers Return to Kmart

|

Attackers 'check out' discount retailers for the second time in three years.

READ MORE
Shadow Brokers Provide Details of Monthly Exploit Dump

Shadow Brokers Provide Details of Monthly Exploit Dump

|

The hacker group is asking for a subscription fee of over $20,000 a month.

READ MORE