Our Blog
Home / Blog
How to scan files in a public cloud
To prevent Azure Storage and Amazon S3 cloud services from becoming malware distribution vectors, scan files while they’re uploading. How to scan files in a public cloud Ivan YakubovichNovember 11, 2021 Doing business today without big data would be unthinkable....
Fake LinkedIn notifications
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait. Roman DedenokNovember 10, 2021 Have you disabled annoying e-mail notifications from social networks? We think that’s great! We even periodically offer advice on how to...
Kaspersky CyberTrace as a threat intelligence platform
We based our new threat intelligence management platform on Kaspersky CyberTrace. Mikhail MoskvinNovember 10, 2021 In terms of daily workload, few infosec roles compare with that of a security operations center (SOC) analyst. We know this firsthand, which is why we...
New tricks of the Trickbot Trojan
Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals. Hugh AverOctober 20, 2021 Exactly five years ago, in October 2016, our solutions first encountered a Trojan named Trickbot (aka TrickLoader or Trickster)....
Eight steps to freedom: How to detach from social networks
Free yourself from social media and start living again. Hugh AverOctober 20, 2021 Social networks becoming a burden? When out-of-control social media taxes your nerves, steals your focus and distracts you from important tasks, it’s time to do a digital detox. Today we...