Women in Tech and Career Spotlight: Jerusalem Bicha

We conclude our series featuring women in tech at Imperva with an interview with Jerusalem Bicha, network operations team lead at Imperva. We talked...

The Year in Review: Rethink Security

During a year of high-profile breaches like Equifax, HBO and Uber, as well as the realization that Yahoo’s highly-publicized 2013 breach compromised the accounts...

Nhash: petty pranks with big finances

According to our data, cryptocurrency miners are rapidly gaining in popularity. In an earlier publication we noted that cybercriminals were making use of social...

Travle aka PYLOT backdoor hits Russian-speaking targets

.travle-big-table td{border:1px solid #eee!important}.travle-big-table td{padding: 10px;} At the end of September, Palo Alto released a report on Unit42 activity where they – among other things...

Jack of all trades

Nowadays, it’s all too easy to end up with malicious apps on your smartphone, even if you’re using the official Google Play app store....

Kaspersky Security Bulletin. Overall statistics for 2017

All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components....

Still Stealing

Two years ago in October 2015 we published a blogpost about a popular malware that was being distributed from the Google Play Store. Over...

Cybercriminals vs financial institutions in 2018: what to expect

ul li {margin-bottom:2.4rem;} Introduction – key events in 2017 2017 was a year of great changes in the world of cyberthreats facing financial organizations. Firstly, in 2017...

Kaspersky Security Bulletin: Review of the Year 2017

ul li {margin-bottom:2.4rem;} Introduction The end of the year is a good time to take stock of the main cyberthreat incidents that took place over the...

Kaspersky Security Bulletin: Story of the year 2017

 Download the Kaspersky Security Bulletin: Story of the year 2017 Introduction: what we learned in 2017 In 2017, the ransomware threat suddenly and spectacularly evolved. Three...

Latest article

Unpatched ChromaDB flaw leaves servers open to remote code execution

Researchers have published details about a critical vulnerability in ChromaDB that could allow unauthenticated attackers to execute arbitrary code and...

[R1] Sensor Proxy Version 1.4.0 Fixes Multiple Vulnerabilities

Sensor Proxy Version 1.4.0 Fixes Multiple Vulnerabilities Jason Schavel Thu, 05/21/2026 - 16:00 Sensor Proxy leverages third-party software to help provide underlying functionality....

AWS KY3P report now available for third-party supplier due diligence

We’re excited to announce that Amazon Web Services (AWS) has completed the S&P Global Know Your Third Party (KY3P) assessment of its security posture....

Hackers Use Fake Microsoft Teams Downloads to Deploy ValleyRAT Malware

Hackers have been caught running a deceptive campaign that uses fake Microsoft Teams download websites to trick users into installing ValleyRAT, a remote access...