Top

LATEST PUBLICATIONS



Can Machine Learning Outsmart Malware?

October 12, 2017

Fighting malware is a modern arms race. Not only has malware evolved to be more evasive and harder to detect, but their vast numbers make it even more difficult to handle. As a result, detecting a malware has become a […]


Weakness In Windows Defender Lets Malware Slip Through Via SMB Shares

October 2, 2017

CyberArk says the manner in which Defender scans for malicious executables in SMB shares gives attackers an opening. Researchers at CyberArk Labs have devised what they claimed is a relatively simple way for attackers to sneak known malware past Windows […]


DHS Orders Government Agencies to Stop Using Kaspersky Products

September 14, 2017

Via: Security Week

The U.S. Department of Homeland Security (DHS) issued a binding operational directive on Wednesday ordering government departments and agencies to stop using products from Kaspersky Lab due to concerns regarding the company’s ties to Russian intelligence. The DHS told agencies […]


Application security

How to Increase Transparency and Rebuild Trust After a Data Breach

October 18, 2017

Via: Security Intelligence

As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total impact of a data breach in […]


Vulnerabilities

BlackOasis APT and new targeted attacks leveraging zero-day exploit

October 17, 2017

Via: Securelist

Kaspersky Lab has always worked closely with vendors to protect users. As soon as we find new vulnerabilities we immediately inform the vendor in a responsible manner and provide all the details required for a fix. On October 10, 2017, […]


Vulnerabilities

Factorization Flaw in TPM Chips Makes Attacks on RSA Private Keys Feasible

October 17, 2017

Via: Threat Post

A flawed Infineon Technology chipset used on PC motherboards to securely store passwords, certificates and encryption keys risks undermining the security of government and corporate computers protected by RSA encryption keys. In a nutshell, the bug makes it possible for […]