The antidote to operational technology conservatism
The specifics of protecting and updating the OT infrastructure.
1222 articles
The specifics of protecting and updating the OT infrastructure.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
Miners still pose a threat to businesses — especially ones that use cloud infrastructure.
An interesting bug in one of the most popular embedded DBMS.
What signs may indicate that a device is infected or being attacked by a hacker.
Which corporate assets should be first in line for protection against cyberattacks?
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Servers with the Zimbra Collaboration suit installed are being attacked via an archive unpacking tool.
The top-4 technologies in use today that long belong in a museum.
Although malware most often infiltrates corporate infrastructure through e-mail, it’s not the only infection method.
How even high-end solutions for business can have “childish” bugs in their update delivery systems.
The developers of a run-of-the-mill Python module recently found out why old unpatched vulnerabilities can be dangerous.
Are you sure your former colleagues don’t have access to corporate data or systems?
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
Introducing our new Transparency Center format and the opening of two more facilities in Europe.
Kaspersky Endpoint Detection and Response Optimum – superior enterprise-cybersecurity, with no fluff.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
An unusual case of an attack executed by weaponizing legit video game code.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.