Tag: Security technologies
-
Applied YARA training Q&A
On August 31, 2021 we ran a joint webinar between VirusTotal and Kaspersky, with a focus on YARA rules best practices and real world …
-
Detecting unknown threats: a honeypot how-to
Dan Demeter, Senior Security Researcher with Kaspersky’s Global Research and Analysis Team and head of Kaspersky’s Honeypot project, …
-
How to confuse antimalware neural networks. Adversarial attacks and protection
Сybersecurity companies implement a variety of methods to discover previously unknown malware files. Machine learning (ML) is a powerful …
-
How we protect our users against the Sunburst backdoor
The detection logic has been improved in all our solutions to ensure our customers protection. We continue to investigate cyberattack on …
-
Adaptive protection against invisible threats
In fact, in most medium-sized companies’ cybersecurity strategies, even with an endpoint solution, there are likely to still be gaps that …
-
Lookalike domains and how to outfox them
Our approach is more complex than simply registering lookalike domains to the company and enables real-time blocking of attacks that use …
-
Looking at Big Threats Using Code Similarity. Part 1
Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed …
-
Big threats using code similarity. Part 1
Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed …
●●●