Mike Mimoso talks to Kaspersky Lab researcher Vitaly Kamluk who was critical in the discovery of the latest version of the cross-platform Adwind RAT.
Kaspersky Lab researcher Sergey Lozhkin was able to turn a few simple hacks into extensive access inside a Moscow hospital network.
Researchers from MalCrawler built a honeypot mimicking an energy management system at the heart of a power grid, exposing attackers’ behavior once they have access to critical infrastructure systems.
Today at the Kaspersky Lab Security Analyst Summit, researchers disclosed details on the Poseidon APT group, a group of hackers who blackmail targets into a fake business relationship where they can further steal data.
Chris Rouland, an expert when it comes to the security of the internet of things, stressed the modern-day equivalent of the Melissa worm could be imminent.
The security industry has done a good job of following the government’s lead when it comes to developing new approaches and strategies.
Microsoft’s John Lambert said today at Kaspersky Lab’s Security Analyst Summit that today’s network defenders need to be pliable, share threat information, and view their network dependencies as attackers do.
At the Security Analyst Summit, Kaspersky Lab researchers unveiled three cybercrime outfits—Metel, GCMAN, and Carbanak 2.0—targeting Russian banks with APT-style tactics.
The SANS Institute has discovered a scareware campaign targeting Mac OS X machines using an installer signed with a legitimate Apple developer certificate.
Mike Mimoso and Chris Brook discuss the news of the week including internet-connected teddy bears, the latest on the Going Dark debate, and whether or not there’s a backdoor in Socat. They also preview next week’s Security Analyst Summit in Tenerife, Spain.