Indicators of compromise (IOCs): how we collect and use them

How exactly can indicators of compromise help information security specialists in their everyday work? To find the answer we asked three Kaspersky experts to share their experience. Continue reading Indicators of compromise (IOCs): how we collect and use them

How and why do we attack our own Anti-Spam?

How to trick the machine-learning model in Anti-Spam designed to detect and quarantine suspicious e-mails, and how to detect such attacks. Continue reading How and why do we attack our own Anti-Spam?

Kaspersky Managed Detection and Response: interesting cases

Several interesting attacks detected by Kaspersky Managed Detection and Response (MDR): two PrintNightmare exploitation attempts, MuddyWater attack and LSASS credential dumping. Continue reading Kaspersky Managed Detection and Response: interesting cases

Kaspersky Managed Detection and Response: interesting cases

Several interesting attacks detected by Kaspersky Managed Detection and Response (MDR): two PrintNightmare exploitation attempts, MuddyWater attack and LSASS credential dumping. Continue reading Kaspersky Managed Detection and Response: interesting cases