SECURITY THREATS

Not a day passes without news of another major data breach, and with the stakes rising – from data loss to regulatory penalties that could put an organization out of business – the cost of doing nothing may soon exceed the cost of adequate security measures. We keep you informed of the latest ways that cybercriminals are attacking organizations, and keep you informed of the best practices and security technologies that will keep your data safe from hackers.

LATEST SECURITY THREATS ARTICLES

Average DDoS Attack Size Surged in Q1 2017

|

The average attack size increased by 26 percent over the previous quarter, according to a recent report.

READ MORE

Samba Patches Critical Remote Code Execution Flaw

|

Widely deployed open-source file and folder sharing project fixes a dangerous vulnerability that could still be leaving consumer NAS users at risk.

READ MORE

New Threats Emerge Using Same Exploit As WannaCry Ransomware

|

Cybercriminals are leveraging the EternalBlue vulnerabilities to launch a range of other attacks.

READ MORE

Data Breach at Restaurant Search Service Exposes 17 Million User Accounts

|

User IDs, names, user names, email addresses and hashed passwords were stolen.

READ MORE

WannaCry Ransomware Hits U.S. Critical Infrastructure

|

The victims include small utilities and manufacturing sites, according to Dragos CEO Robert M. Lee.

READ MORE

TOP SECURITY THREATS RESOURCES

TYPES OF MALWARE

Here are some of the most common malware types and how to defend against them, from adware to worms and everything in between.

READ MORE

HOW TO STOP RANSOMWARE

Ransomware is a growing threat that can cost enterprises millions. Find out how to prevent it or get rid of it.

READ MORE

CYBER INSURANCE

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

Business Perception of IT Security: In the Face of Inevitable Compromise

To investigate cyber threat landscape perception and reality, Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries. We asked businesses about their perceptions of the main security threats they face and the …

NSS Labs: Advanced Endpoint Protection Test Report

The ultimate goal of any attack on a computer system is to gain access to a target host and perform an unauthorized action, which results in the compromise of an asset or data. Intruders may use several techniques to circumvent these levels of protection, such as targeting vulnerable …

Is the Future of Enterprise Security in Managed Services?

Today's reality is that security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Despite enterprises' best efforts to bolster their security posture and keep current with emerging vulnerabilities, cyberattacks persist, and data …

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Are you confident that employees are only using IT-sanctioned methods of transferring data? If the answer is "no", then your IT infrastructure and sensitive data are far more vulnerable to being breached by hackers and cybercriminals. Many IT teams may not even realize that "shadow IT" …
 
SEE ALL WHITEPAPERS
 
DocuSign, Bell Canada Hacked

DocuSign, Bell Canada Hacked

|

The hackers stole customer email addresses for use in phishing campaigns and other attacks.

READ MORE
WannaCry Ransomware Lives On Despite Kill Switch, Microsoft Patches

WannaCry Ransomware Lives On Despite Kill Switch, Microsoft Patches

|

New versions of the malware are already spreading as the cat-and-mouse game continues.

READ MORE
Massive Ransomware Outbreak Spreads to 74 Countries

Massive Ransomware Outbreak Spreads to 74 Countries

|

Victims include FedEx, Spain's Telefonica, Russia's MegaFon, and the U.K.'s National Health Service.

READ MORE
Mobile Malware: What It Is and How to Stop It

Mobile Malware: What It Is and How to Stop It

|

Mobile malware is growing. Do you know what mobile malware is and more importantly, how to keep it off your device?

READ MORE