Detecting unknown threats: a honeypot how-to

Dan Demeter, Senior Security Researcher with Kaspersky’s Global Research and Analysis Team and head of Kaspersky’s Honeypot project, explains what honeypots are, why they’re recommended for catching external threats, and how you can set up your own simple SSH-honeypot. Continue reading Detecting unknown threats: a honeypot how-to

How to confuse antimalware neural networks. Adversarial attacks and protection

Сybersecurity companies implement a variety of methods to discover previously unknown malware files. Machine learning (ML) is a powerful and widely used approach for this task. But can we rely entirely on machine learning approaches in the battle with the bad guys? Or could powerful AI itself be vulnerable? Continue reading How to confuse antimalware neural networks. Adversarial attacks and protection

How we protect our users against the Sunburst backdoor

The detection logic has been improved in all our solutions to ensure our customers protection. We continue to investigate cyberattack on SolarWinds and we will add additional detection once they are required. Continue reading How we protect our users against the Sunburst backdoor

Adaptive protection against invisible threats

In fact, in most medium-sized companies’ cybersecurity strategies, even with an endpoint solution, there are likely to still be gaps that can and should be closed. In this article, we look at what those gaps are and how to fill them. Continue reading Adaptive protection against invisible threats

Looking at Big Threats Using Code Similarity. Part 1

Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed initially for internal use by the Kaspersky Global Research and Analysis Team, is now being made available to a wider audience. Continue reading Looking at Big Threats Using Code Similarity. Part 1

Side-Channel Attacks: Cyber Warfare’s New Battleground

The current state of cybersecurity is complex, fast-moving and a critical risk to all organizations. Understanding where U.S. businesses stack up in terms of their security knowledge and defense strategy is of utmost importance. It’s critical that lea… Continue reading Side-Channel Attacks: Cyber Warfare’s New Battleground

The Moonshot Information Security Project

Recently, I was reading about the U.S. government considering funding a “moonshot” information security project—that is, like the efforts in the 1960s to reach the moon (before the Soviets), abandon incrementalism in information security and try the i… Continue reading The Moonshot Information Security Project