Explore our Cloud Workload Security whitepaper, developed by Kaspersky in partnership with ISG Provider Lens. Key insights include: 🔹 Drivers of cloud migration and associated security challenges. 🔹 Essential future imperatives for cloud workload security and selection criteria for platforms. 🔹 Comparing on-premises and container security: factors to consider and best practices. Learn more about Kaspersky CWS -> https://kas.pr/56zr #CloudSecurity #CWS #Kaspersky
Kaspersky
Computer- und Netzwerksicherheit
Stadtkreis 1 Altstadt, Zurich 426.021 Follower:innen
Kaspersky. Bring on the Future.
Info
Our mission is simple – building a safer world. And in fulfilling that mission we aim to become the global leader in cybersecurity – by securing technology to make sure that the possibilities it brings become opportunities for each and every one of us. Bring on endless possibilities. Bring on a safer tomorrow.” - Eugene Kaspersky, CEO of Kaspersky https://www.kaspersky.com/about/company
- Website
-
https://kaspersky.com/
Externer Link zu Kaspersky
- Branche
- Computer- und Netzwerksicherheit
- Größe
- 5.001–10.000 Beschäftigte
- Hauptsitz
- Stadtkreis 1 Altstadt, Zurich
- Art
- Privatunternehmen
- Gegründet
- 1997
- Spezialgebiete
- IT Security Software Development, cybersecurity, antivirus, malware protection, cloud data protection, Cyber Security Services, mobile security, data security, cyberthreat detection, virtualization security, consumer cybersecurity, Internet Security, mac security, Free Antivirus, Parental Control, Fraud Prevention, Industrial Cyber Security und cybersecurity research
Orte
Beschäftigte von Kaspersky
-
Riccardo de Rinaldini
Head of Global Consumer Marketing at Kaspersky
-
Leonid Efremov
Senior DevOps Engineer
-
Eden Focante Teles
-
Siang Tiong (姚祥忠) YEO
Sensitive to the cultural differences between Asian and Western countries, I formulate strategies and operationalise it | APAC Leader | Distributed…
Updates
-
Empower your team’s #security posture with our leading #technology, backed by elite intelligence and expert guidance from top #cybersecurity minds. Learn more: https://kas.pr/r3vj
-
-
Join us for an exclusive #webinar as we unveil the inner workings of our five Centres of Expertise: Threat Research, Global Research and Analysis Team, AI Research, Security Services, and ICS CERT. Discover their pivotal roles in safeguarding businesses and individuals, and explore real-world case studies showcasing our expertise in defending against complex #cyberthreats. Book your seat now: https://lnkd.in/dmSeKvR8
-
-
Benefit from our Global Summer Promotion! Simply make a request on our online form to access free of charge emergency rapid response, analysis, containment for ONE #security incident from June to August 2024, to ‘best effort’ service level agreement for 1000+ endpoints. We can help you investigate one security incident for free, which includes: ✔️ Reducing the impact of a security breach or an attack on your IT environment ✔️ Identifying possible incident causes and sources ✔️ Preparing a remediation plan for complete threat elimination and further implementation of protection measures ✔️ Reconstructing the #cybersecurity incident’s chronology and logic Act now to protect your business! ⇒ https://kas.pr/e772
-
-
If your phone is useful to you, it’s also useful to hackers. Kaspersky Small Office Security locks down missing or stolen devices for up to 25 employees, keeping your data private and your business safe. Learn more: https://lnkd.in/dVKev3nA #Cybersecurity #InfoSec #SMB
-
We discovered the spy in March 2024, and it's been operating since at least the summer of 2021! LianSpy targets — for now — users of Android smartphones in Russia, but the unconventional approaches it employs could potentially be applied in other regions as well. What a LianSpy can do: 📌 pushpin: silently and discreetly monitors user activity by intercepting call logs; 📌 sending a list of installed applications to the attackers’ server; 📌 recording the smartphone’s screen — mainly during messenger activity. How it technically works :👉 https://kas.pr/s2xk
-
-
Key APT Research and Cybersecurity News of the Week 👮♂️ Where Do New Ransomware Groups Get Their Malware? Our analysis uncovers the typical patterns of this black market — ranging from the SEXi group reworking two different codebases (Babuk for Linux and Lockbit for Windows) to the keygroup777 gang employing eight different malware families in just two years. https://lnkd.in/dP_XT9TQ 🆔 A Dangerous Email Attack Precedent: Exploiting vulnerabilities in Proofpoint and Microsoft 365 email protection, attackers managed to send massive spam campaigns impersonating Proofpoint clients, including Disney. These emails successfully bypassed SPF and DKIM checks. https://lnkd.in/dap9-YTY 🔵 New APT41/ShadowPad Espionage Attacks: Research institutions in Taiwan have been targeted, with the attack vector involving known Office vulnerabilities. In addition to the ShadowPad malware, the attackers also deployed Cobalt Strike. https://lnkd.in/gJbNTWju 👮♂️ Breaking Down BlackBasta DNS Traffic to mitigate attacks early. https://lnkd.in/dS_qqgbG Malicious packages hit npm repository once again: Trojanized packages load additional Windows malware onto affected systems. The researchers attribute the attack to the North Korean group Stressed Pungsan. https://lnkd.in/d-q9CZ_F 🔎 Tunnelling Trick Through Legitimate TryCloudflare Function. This tactic is gaining popularity among attackers, even being used to deliver basic commercial RATs. Phishing emails with legal and tax-related themes contain links to a .url file, which creates a tunnel, enabling access to malicious hosting without public web servers. https://lnkd.in/dTQGzt2X 💻 New Windows Backdoor BITSLOTH: noteworthy for using Microsoft’s BITS service as a C2 mechanism. Samples were found in Latin America, with origins unknown, though the logging functions are in Chinese. https://lnkd.in/dwKvSsZ8 🔄 Unpleasant combo: a fake Google Authenticator app is being distributed via Google Ads. The malicious payload is Deer Stealer. https://lnkd.in/gav9pSYM https://lnkd.in/ggAp6xpA #news #digest #APT #cybersecurity
-
-
Our Managed Detection and Response (MDR) solution offers advanced 24/7 monitoring and protection against the most complex threats. Benefit from a team of security experts without the need to establish one, freeing up in-house resources for critical tasks. Learn more in the cards ⬇️ Sign up: https://kas.pr/5msj
-
Our CEO, Eugene Kaspersky, shares the key takeaway from last year's #KasperskyCSW. Watch this highlight as we prepare for this year's event on August 5, 2024! Follow us on X and LinkedIn for live updates and insights.
-
Master the techniques of identifying and analyzing digital data with our new course ⇒ https://kas.pr/v7ka