Kaspersky Security Bulletin: Review of the Year 2017

ul li {margin-bottom:2.4rem;} Introduction The end of the year is a good time to take stock of the main cyberthreat incidents that took place over the...

Kaspersky Security Bulletin: Story of the year 2017

 Download the Kaspersky Security Bulletin: Story of the year 2017 Introduction: what we learned in 2017 In 2017, the ransomware threat suddenly and spectacularly evolved. Three...

IoT lottery: finding a perfectly secure connected device

Black Friday and Cyber Monday are great for shopping. Vendors flood the market with all kinds of goods, including lots of exciting connected devices...

Five Reasons CISOs Should Keep an Open Mind About Cryptocurrencies

Far from a dying breed, cryptocurrencies are not only evolving but being accepted in countless new markets. CISOs need to know the ins and...

The Hunt for IoT: The Rise of Thingbots

With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs point to them becoming the attacker infrastructure...

Achieving Multi-Dimensional Security through Information Modeling – Part 1

Information modeling blends lateral thinking and deductive logic. Applied to information security, it’s a powerful technique for designing a security architecture with multi-dimensional controls...

Latest article

China-Linked Hackers Breach Southeast Asian Military Systems in Long-Running Spy Campaign

A sophisticated and long-running cyber espionage campaign, tracked as CL-STA-1087, has been quietly targeting military organizations across Southeast Asia since at least 2020. The...

Chained vulnerabilities in Cisco Catalyst switches could induce denial-of-service

Cisco’s widely deployed Catalyst 9300 Series enterprise switches have four security vulnerabilities, two of which could be chained to cause...

US government launches Bureau of Emerging Threats

The US’ new Bureau of Emerging Threats sits within the State Department and will supposedly help address national security threats arising from cyber attacks,...

The Unintentional Enabler: How Cloudflare Services are Abused for Credential Theft and Malware Distribution

By: Marie Mamaril, Intelligence TeamCloudflare's suite of services like Workers, Tunnels, Turnstile, Pages and Cloudflare R2 (*r2dev) continue to be abused by threat actors...