🌐 Join us at the Kaspersky Booth (H25-B35) at Gitex Global, October 14-18, at the Dubai World Trade Centre! 🚀 Discover how our latest IT solutions & #CyberImmunity are reshaping digital security. Learn how we embed security into IT infrastructure to keep critical functions safe, even in hostile environments. Don't miss out! Discover more: https://kas.pr/n7cq 💡 #Gitex2024 #CyberSecurity #SecureByDesign #Dubai
Kaspersky
Computer and Network Security
Stadtkreis 1 Altstadt, Zurich 433,640 followers
Kaspersky. Bring on the Future.
About us
Our mission is simple – building a safer world. And in fulfilling that mission we aim to become the global leader in cybersecurity – by securing technology to make sure that the possibilities it brings become opportunities for each and every one of us. Bring on endless possibilities. Bring on a safer tomorrow.” - Eugene Kaspersky, CEO of Kaspersky https://www.kaspersky.com/about/company
- Website
-
https://kaspersky.com/
External link for Kaspersky
- Industry
- Computer and Network Security
- Company size
- 5,001-10,000 employees
- Headquarters
- Stadtkreis 1 Altstadt, Zurich
- Type
- Privately Held
- Founded
- 1997
Locations
Employees at Kaspersky
-
Riccardo de Rinaldini
Head of Global Consumer Marketing at Kaspersky
-
Leonid Efremov
Senior DevOps Engineer
-
Eden Focante Teles
-
Siang Tiong (姚祥忠) YEO
Sensitive to the cultural differences between Asian and Western countries, I formulate strategies and operationalise it | APAC Leader | Distributed…
Updates
-
🛰 IoT now has standards While most horror stories about #IoT security involve consumer devices, large organizations also suffer from poorly implemented smart technologies—just recall the epic tale of undocumented features in locomotives on the Polish railway. The recently adopted standard ISO/IEC 30141:2024 and its intriguing supplement, ISO/IEC TS 30149:2024, aim to bring order to this field by describing principles of trustworthiness in IoT. We explored the difference between trust and trustworthiness, the aspects in which it should be demonstrated for IoT, and how this will impact the future of consumer and industrial IoT. Read more: https://lnkd.in/dJ4QaEx6 #cybersecurity
-
⚠️ Almost a Royal Flush: Urgent Patches for Ivanti, Fortinet, and Palo Alto It's been a tough week for network security device manufacturers and especially for their customers. Palo Alto's bulletin https://lnkd.in/eskg8VmS addresses five vulnerabilities in Palo Alto Networks Expedition, which can facilitate the theft of passwords and API keys for PAN-OS devices. The CVSS scores for these CVEs range from 7 to 9.9. It is recommended to rotate all passwords and API keys after applying updates. The firewalls themselves are not affected by these defects. A detailed bug description https://lnkd.in/g-KMhRKM and a PoC suggest that exploitation attempts are likely imminent. Meanwhile, CISA has announced the active exploitation of CVE-2024-23113 https://lnkd.in/eASGZnHb an RCE in FortiOS with a CVSS score of 9.8, patched in February https://lnkd.in/g849txrs and expanded in April. Affected products include FortiOS, FortiPAM, FortiProxy, and FortiWeb. U.S. government agencies have been instructed to apply patches or mitigations within three weeks, and everyone else should also act quickly. Ivanti continues on its previous path, publishing an October bulletin https://lnkd.in/e4d74mny about vulnerabilities, three of which, in combination with a zero-day fixed in September, are again being exploited in real attacks. These concern vulnerabilities in Ivanti Cloud Services Application (CVE-2024-9379, -9380, -9388 plus the known CVE-2024-8963), which together allow arbitrary code execution on the server. The vendor emphasizes that the CSA 5.0 line is not affected; versions 4.6 are vulnerable. No active exploitation is reported for two other significant defects—CVE-2024-7612 in Ivanti Endpoint Manager Mobile (unauthorized configuration changes, CVSS 8.8) and CVE-2024-37404 in Ivanti Connect Secure / Policy Secure (RCE, CVSS 9.1). Patch quickly! #news #vulnerabilities #fortinet #ivanti #paloalto #cybersecurity
-
From June to December, enjoy a 30% discount on our #IncidentResponse retainer when acquired with Kaspersky MDR. Secure your business with expert support. Leave an online request today ⇒ https://kas.pr/55sj #Cybersecurity #InfoSec
-
Join us at GITEX Global 2024 in Dubai on October 14th! Visit the Kaspersky booth (Cyber Valley Hall 25) for expert insights on the latest cybersecurity trends and strategies. See you there! Learn More: https://kas.pr/6pwg #GiantExploreGlobal #Cybersecurity #Kaspersky
-
Siang Tiong (姚祥忠) YEO, our General Manager for SEA, invites you to join our Industrial Cybersecurity Conference starting tomorrow. Catch the latest OT cybersecurity trends and real-world case studies from leading experts—live. Don’t miss this chance to gain valuable insights firsthand. Tune in ⇒ https://lnkd.in/dTx2Fkj2 #Kaspersky #Cybersecurity #OTsecurity #ICSsecurity
-
💻 October Patch Tuesday: 5 Zero-Days and 118 CVEs Microsoft's latest update addresses 118 flaws, including two actively exploited zero-days and three defects disclosed before patching, with a public PoC available for one. There are 43 vulnerabilities leading to RCE, 28 to privilege escalation, 26 to DoS, and 7 each to spoofing and security feature bypass. Only three of the patched vulnerabilities are rated critical. https://lnkd.in/eGsGbJa Among the five zero-days, the following have been observed in the wild: - CVE-2024-43572 (CVSS 7.8), an RCE in Microsoft Management Console (MMC). Exploiting this vulnerability requires convincing the victim to open a malicious MSC file. - CVE-2024-43573 (CVSS 6.5), a Windows MSHTML Platform Spoofing flaw. Yes, attackers have found another flaw in the legacy of IE. Microsoft provides no details on when or how this vulnerability was exploited, but experts suspect attackers have learned to bypass a similar patch issued earlier this year. Another zero-day relates to a known curl flaw, patched upstream in July (CVE-2024-6197, CVSS 8.8). Microsoft does not specify where and when the two remaining vulnerabilities were disclosed. CVE-2024-43583 allows privilege escalation to SYSTEM right on the login screen. Fixing it requires not only installing the patch but also ensuring that Microsoft input methods are installed and available on the system (KB5046254 - https://lnkd.in/dpNdneTd). We might hear more about CVE-2024-20659 at cybersecurity conferences, as it is another UEFI bypass allowing the compromise of the hypervisor and protected kernel. Redmond states that exploitation requires physical access and a system reboot, but similar claims were initially made about BlackLotus too. Among the critical vulnerabilities that are not zero-days, CVE-2024-43468, an RCE in Microsoft Configuration Manager with a CVSS score of 9.8, deserves attention. To protect against network attacks that require no authentication, you must install the update in the console https://lnkd.in/dvzBfEnW and if that is not possible, apply mitigation advice https://lnkd.in/dXZZ-wHb and change the service account from Computer to something else. Also noteworthy is a series of 12 RCEs in Windows Routing and Remote Access Service (RRAS) (CVE-2024-38212 and others), CVE-2024-43582 in the Remote Desktop Protocol Server, and a couple of defects in the Windows Remote Desktop Client (CVE-2024-43533, CVE-2024-43599). #news #vulnerabilities #Microsoft #patchtuesday #cybersecurity
-
Kaspersky Security Center takes the complexity out of IT security administration and systems management. Learn more with our comprehensive Q&As for Security Center: https://kas.pr/o9ur #Kaspersky #KasperskySecurityCenter #Cybersecurity
-
🌐 Exciting news! We're inviting you to #GitexGlobal2024, taking place from October 14-18 at the Dubai World Trade Centre! 🚀 Make sure to stop by the Kaspersky booth H25- B35, where we'll be showcasing our latest cybersecurity solutions. Discover how our #KasperskyThinClient, with its built-in Kaspersky Operating System, stands out by providing top-notch protection without the need for additional antivirus software. It’s specifically designed for industrial environments, ensuring seamless integration and robust security. Join us to learn how our cutting-edge solutions can optimize your operations and safeguard your data. See you at #GitexGlobal2024! 🔒💡 #Cybersecurity #IoTSecurity #Kaspersky #DigitalProtection
-
Just one day left until our Industrial Cybersecurity Conference in APAC! Don’t miss out on insights into the latest #OTcybersecurity strategies, real-world #ICSsecurity case studies, and modern solutions shaping the industry. Join us live ⇒ https://lnkd.in/dTx2Fkj2 #Kaspersky #Cybersecurity #OTsecurity