KasperskyVerified account

@kaspersky

Kaspersky is the world’s largest privately held vendor of Internet security solutions for businesses and consumers. For help and support, tweet

Joined February 2008

Tweets

You blocked @kaspersky

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @kaspersky

  1. 6 hours ago

    Why is brand and design so important for your business? We examine this often misunderstood channel of communication 👉

    Undo
  2. 7 hours ago
    Undo
  3. 8 hours ago

    Earlier this year, we developed a mobile game. A bit unexpected for a cybersecurity company. But how did we do it?

    Undo
  4. Undo
  5. Undo
  6. 10 hours ago

    Who are we? We operate in 200+ countries 🌎, have 4,500+ employees spread across 30+ countries 🖥️ and we're here to build a safer digital world 🔒 Learn more 👉

    Undo
  7. Undo
  8. Undo
  9. 12 hours ago

    Ever wondered what 'port-scanning' is?

    Undo
  10. 13 hours ago

    Our Global Transparency Initiative (GTI) is more than just software and hardware – it’s a set of concrete and measurable actions, designed to show our customers that we’re committed to openness, trust and transparency. Learn more ⇒

    Undo
  11. 14 hours ago

    We are proud to announce! G2 recognizes Kaspersky Endpoint Security for Business as having the Best Estimated ROI Small-Business for Spring 2022! Learn more:

    Undo
  12. 15 hours ago

    Bluetooth can be used to track smartphones via minor manufacturing imperfections in hardware, which create a sort of finger-print for each device. Full story 👇

    Undo
  13. 16 hours ago

    After a hack, company data & system info is often sold on the dark market. In our upcoming webinar, security experts will discuss: ✔️ How cybercriminals evaluate the price for data ✔️ How to keep your data protected ✔️ & so much more! Register now 👉

    Undo
  14. 17 hours ago

    Did you know that malware can infect your router? If you're internet is sluggish or acting oddly, here's how you can check for hidden gremlins 👇

    Undo
  15. 18 hours ago

    Save up to 25% on selected courses! 👇 From Reverse engineering to threat hunting with YARA and Advanced malware analysis - get you and your team upskilled and ready against for any threat, with our online training courses. Learn more ⇒

    Undo
  16. Jun 13

    Don't be the business that doesn't know how to respond to a cyberattack. Our expert-led training course can help you: ✔️ know how to ID & respond to a cyber incident ✔️ understand the phases of incident response ✔️ test your skills & more Register now:

    Undo
  17. Undo
  18. Undo
  19. Jun 13

    ’s infrastructure is nothing short of extraordinary: ✔️ Distributed via plain HTTP requests that normally return legit executables ✔️ Communicates w/ IP addresses selected randomly inside a specific AS ✔️ Interacts w/ non-existent domain names

    Undo
  20. Jun 13
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·