
Combating data leaks through database encryption
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
3272 articles
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
How an intern can be a threat to your organization’s cybersecurity and what you can do about it.
Meet Valter Generoso, Technical Account Manager at Kaspersky Latin America.
Our experts studied the shadow market for initial access to corporate infrastructure.
From possible sentient AI to leaky stalkerware and digital doubles – it’s episode 255 of the Transatlantic Cable!
Kaspersky Managed Detection and Response experts identified the adversarial techniques that were most prevalent cybersecurity incidents in 2021.
For this edition of the Kaspersky podcast, Ahmed, Jag and Jeff discuss an app that allows employees to rate colleagues, Bored Ape compromised, Elon’s Twitter spat and more.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Our experts studied the WinDealer malware created by the LuoYu APT group.
For this edition of the Kaspersky podcast, Ahmed, Jag and Jeff discuss Seth Green’s stolen Bored Ape, ransomware for good and more.
Here’s how phishers extract phone numbers and credentials from users of Wise.
Studying search queries popular with kids will help you start speaking your kid’s language.
New vulnerability CVE-2022-30190, aka Follina, allows exploitation of Windows Support Diagnostic Tool via MS Office files.
Meet Rosemarie Gonzales, Corporate Communications Manager at Kaspersky Southeast Asia.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
Episode 252 of the Transatlantic Cable looks at facial recognition, Conti ransomware gang shutdown and much more!
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
What should an incident response specialist be able to do and how can they improve their skills?
Notifications