February 10, 2022 - Press Releases
Kaspersky is the most recommended vendor among recipients of the 2021 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training recognition. As the only Endpoint Protection Platform (EPP) vendor to achieve the accolade, Kaspersky is also the only company to have Customers’ Choice status in EPP, and Security Awareness (SA) categories.
February 10, 2022 - Press Releases
Compared to Q3 2021, the total number of Distributed Denial of Service (DDoS) attacks in Q4 shows an increase of 52%. This is 4.5 times more than the same time last year. These and other findings were published in the new Kaspersky DDoS attacks in Q4 2021 report.
February 09, 2022 - Press Releases
During 2021, cyber-fraudsters involved in the creation and distribution of spam and phishing tried to lure users using topics focused on lucrative investments, online streaming of global movie or TV premieres and themes related to restrictions, requirements and benefits of the ongoing pandemic. These are the key outcomes of Kaspersky’s Annual Spam and Phishing Report.
February 07, 2022 - Press Releases
An international symposium, “New Elements”, will be held on February 12, bringing together artists, scientists, philosophers, technology experts as well as representatives from the world’s leading museums and festivals. The aim is to discuss recent trends in science-art and the nature of autographic processes, and to share new perspectives on computational methods. The event will be live-streamed.
February 07, 2022 - Press Releases
Kaspersky discovered that a malicious campaign dubbed Roaming Mantis, previously targeting mostly Asian regions, is expanding its infections via actively smishing (attacking through phishing mobile text messages and redirecting users to malicious content) new targets in Germany and France. The actor behind the campaign spreads mobile malware and phishing pages to collect targets’ private information and steal their money. The infected device then sends SMiShing messages to the next set of targets, like those that are in the user’s list of contacts for example.
February 01, 2022 - Press Releases
Kaspersky experts have discovered that the most commonly used protocol for transferring data from wearable devices used for remote patient monitoring contained 33 vulnerabilities, including 18 “critical vulnerabilities” in 2021 alone. This is 10 more critical vulnerabilities than in 2020, and many of them remain unpatched. Some of these vulnerabilities give attackers the potential to intercept data being sent online from the device.
January 31, 2022 - Press Releases
Kaspersky has released a new, story-rich, mobile cybersecurity quest titled [Dis]connected. The interactive adventure is a dive into the daily routine of a person in the near future who is on a quest to maintain a healthy work-life balance and be successful in both their career and relationships. To complement traditional security awareness training programs for enterprises, the game vividly demonstrates the benefits of secure behavior and can be used to reinforce what employees have learned. The game is suited for nationwide educational and media projects.
January 28, 2022 - Press Releases
A global cybersecurity company plays a crucial role in protecting Moonfall’s heroes on their historic journey to save Earth.
January 26, 2022 - Press Releases
In the first three years of its MSP Foundation project, Kaspersky has achieved fourfold growth in sales among its managed service providers.
January 20, 2022 - Press Releases
Kaspersky’s researchers have uncovered the third case of a firmware bootkit in the wild. Dubbed MoonBounce, this malicious implant is hidden within a computer’s Unified Extensible Firmware Interface (UEFI) firmware, an essential part of computers, in the SPI flash, a storage component external to the hard drive. Such implants are notoriously difficult to remove and are of limited visibility to security products. Having first appeared in the wild in the spring of 2021, MoonBounce demonstrates a sophisticated attack flow, with evident advancement in comparison to formerly reported UEFI firmware bootkits. Kaspersky researchers have attributed the attack with considerable confidence to the well-known advanced persistent threat (APT) actor APT41.
  • 1 /352
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 352