Home Blog Page 159

Cybercriminals vs financial institutions in 2018: what to expect

ul li {margin-bottom:2.4rem;} Introduction – key events in 2017 2017 was a year of great changes in the world of cyberthreats facing financial organizations. Firstly, in 2017 we witnessed a continuation of cyberattacks targeting systems running SWIFT — a fundamental part of the world’s financial ecosystem. Attackers were able to use malware in financial institutions to manipulate applications responsible for cross-border transactions,...

Kaspersky Security Bulletin: Review of the Year 2017

ul li {margin-bottom:2.4rem;} Introduction The end of the year is a good time to take stock of the main cyberthreat incidents that took place over the preceding 12 months or so. To reflect on the impact these events had on organizations and individuals, and consider what they could mean for the overall evolution of the threat landscape. Looking back over 2017, what...

Kaspersky Security Bulletin: Story of the year 2017

 Download the Kaspersky Security Bulletin: Story of the year 2017 Introduction: what we learned in 2017 In 2017, the ransomware threat suddenly and spectacularly evolved. Three unprecedented outbreaks transformed the landscape for ransomware, probably forever. The attacks targeted businesses and used worms and recently leaked exploits to self-propagate, encrypting data and demanding a ransom they didn’t really want. The perpetrators of...

IoT lottery: finding a perfectly secure connected device

Black Friday and Cyber Monday are great for shopping. Vendors flood the market with all kinds of goods, including lots of exciting connected devices that promise to make our life easier, happier and more comfortable. Being enthusiastic shoppers just like many other people around the world, at Kaspersky Lab we are, however paranoid enough to look at any Internet...

Five Reasons CISOs Should Keep an Open Mind About Cryptocurrencies

Far from a dying breed, cryptocurrencies are not only evolving but being accepted in countless new markets. CISOs need to know the ins and outs, pros and cons. - Read more

The Hunt for IoT: The Rise of Thingbots

With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs point to them becoming the attacker infrastructure of the future. - Read more

Achieving Multi-Dimensional Security through Information Modeling – Part 1

Information modeling blends lateral thinking and deductive logic. Applied to information security, it’s a powerful technique for designing a security architecture with multi-dimensional controls that minimizes risk and achieves continuous compliance. - Read more

Latest article

RSA Conference: UK NCSC Head Urges Industry to Develop Vibe Coding Safeguards

The head of the UK’s NCSC is calling the cybersecurity industry to “seize the disruptive vibe coding opportunity” to make software more secure ...

New Whitepaper: Exploiting Cellular-based IoT Devices

Rapid7 has released a whitepaper titled “The Weaponization of Cellular Based IoT Technology,” by Deral Heiland, principal security researcher, IoT, at Rapid7, and Carlota...

US Bans New Foreign-Made Routers, Citing ‘Unacceptable’ Security Risks

The FCC bans new foreign-made routers over national security risks, a move that could reshape the US tech supply chain and impact pricing and...

CVE-2026-23669 RPC Runtime Library Remote Code Execution Vulnerability

Corrected CVE title. This is an informational change only. - Read more