How browser plugins can leak corporate secrets
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.
653 articles
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.
Eugene Kaspersky explains how Kaspersky Sandbox uses virtual machines to thoroughly examine malware’s behavior.
Collaboration tools can become a vector for malware propagation.
We explain what an SOC 2 audit is, why we passed it, and how it was performed.
Fraudsters are using the feedback forms on the websites of reputable companies to send spam.
To build a safer future, we need to stop fearing and start immunizing.
Workers who are comfortable storing work information on their personal devices are not always cautious enough to keep it secure.
This ransomware uses managed service providers’ infrastructure or the Oracle Weblogic vulnerability to infect and encrypt victims’ systems.
Cybercriminals may use your resources for cryptocurrency mining. How you can prevent it.
A new spam mailing threatens the reputations of small businesses websites.
Digital signatures cannot solve the requirement of checking the authenticity of documents required by KYC procedures. That is where smart contracts may come in handy.
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
How to steal a million (OK, half a million), or what happened to the Boca Juniors
To protect themselves, businesses need to take a proactive approach, constantly adapting their security controls to the ever-changing threat environment.