How can you choose the best security solution for a business or home, considering that user reviews can be sketchy or biased, and ads are always batting for some developers team? Fortunately, theres also a reliable source of information in the shape of reputable labs that specialize in testing cybersecurity solutions. show more ...
For one thing, they have the skills and experience necessary for an expert evaluation. For another, they are independent of the test participants. These labs regularly publish the results of their studies, and were here to help make sense of them. Instead of a thousand words There are many well-regarded test labs out there, each of which conducting dozens of studies every year. As a result, the amount of information available is considerable — enough to fairly drown the uninitiated. To make things easier, Kaspersky compiles its own annual summary of the tests carried out by AV-Test, AV-Comparatives, MRG Effitas, SE Labs and other major players. We cover both all-round and narrowly-focused studies — for example, how well different vendors solutions tackle ransomware or spyware. Having compiled all the results, we bring them together in our TOP3 chart. This infographic rates security developers on three criteria simultaneously: (i) how actively they took part in tests (horizontal axis), (ii) how many times they made the Top 3 (vertical axis), and (iii) how many times they took first place (diameter of the respective circle). Thus, the overall result is easy to discern: the bigger the circle with the vendor name, and the further to the right and higher it is — the better its products performed over the past year. In total, we participated in 75 independent tests in 2021; in 84% of them we placed in the top 3, and in 57 tests our products ranked first. The bigger the circle, the more often the companys solutions ranked first in independent tests In 2021, Kaspersky solutions were among the Top 3 most tested antivirus and security products. Our solutions achieved more podium finishes than any other. Kaspersky protection also claimed the highest number of top spots. This means that most specialized test labs recognize the high performance of our solutions — both corporate and home. Everything checked Another reason why we ensure our products participate in as many tests as possible is because cyberthreats have become too diverse for one all-round study. Here are just some of the specialized tests our security solutions have passed. Ransomware During the tests, the participating antiviruses face several families of ransomware in both corporate and home setups. These tests can be quite absorbing — so much so that we dedicated a separate article to one of them. Fileless Fileless attacks, as their name suggests, do away with files on user devices and are therefore hard to detect. The tests evaluate not only success rate, but also the time it takes to detect fileless attacks. Vulnerabilities and exploits Cybercriminals use exploits to attack a system through vulnerabilities, so the tests assess the speed of detecting and eliminating them. APT attacks To reach an important target, cybercriminals sometimes conduct multi-stage attacks and create unique tools. In APT defense testing, researchers test solutions ability to detect and block unfamiliar and brand-new threats. Phishing During phishing testing, experts simulate the behavior of average online users and evaluate how promptly and effectively protection kicks in against data thieves. Stalkerware Stalkerware refers to semi-legal tracking apps that anyone can buy online. People often covertly install them on the device of a partner or spouse to monitor their location, read their contacts and messages, look through their photos and so on. Because of their semi-legal status, stalkerware cannot formally be classified as malware. For this reason, some security developers prefer to turn a blind eye and not pay due attention to protection against this class of programs. But we disagree: we consider it important to protect our customers from tracking apps, and do our best to ensure that our products effectively detect stalkerware and warn the victims. False positives A good security solution not only eliminates threats, but also refrains from bothering the user over mere trifles. Dont underestimate how important this is: if your antivirus constantly cries wolf, youll stop taking it seriously. Also note that some security developers try to compensate for their less-than-perfect technologies by sounding the alarm at the slightest possibility of a threat. Therefore, the number of false positives is often a good indicator of the true quality of protection: the fewer, the better. As such, most independent tests typically list the number of false positives alongside threat detection capability. Expert opinion To recap, in 2021 Kaspersky products passed numerous tests with flying colors, and independent experts once again confirmed the companys leadership in the security solutions market. Of course, we have no intention of resting on our laurels, and shall continue to develop our technologies to keep your devices fully protected against all threats. Safe online surfing!
Three main malware signatures account for roughly 40% of all detected credit card skimmers since January 2021. All three of them are most commonly found on WordPress websites.
The long-running cybercrime group FIN7, known for breaking into payment systems and corporate networks, has been moving into ransomware operations, according to researchers at security firm Mandiant.
New findings from a Software Advice survey reveal that 22% of small practices and 45% of large practices have experienced a ransomware attack at some point, with numbers rising in the past three years.
The company wrote on Twitter that a hacker managed to manipulate its money market, Anchor, and increased the price of INV via Sushiswap – an open-source ecosystem of DeFi tools.
A new WhatsApp phishing campaign impersonating WhatsApp's voice message feature has been discovered, attempting to spread information-stealing malware to at least 27,655 email addresses.
According to the 2011 indictment, the DDoS attack was perpetrated as part of “Operation Peace Camp 2010,”– a protest held in retaliation for Santa Cruz banning camping within the city limits.
When asked about their overall cybersecurity priorities, 29.8% of UK firms said that cloud-native application security is a critical cloud security priority – more important than SaaS apps (20.2%) and identity and access management (28.8%).
The Bureau of Cyberspace and Digital Policy officially launched Monday at the State Department, with wide latitude to develop policy on diplomatic issues related to technology and the internet.
A standard approach to addressing spoofed domains is to compare them to a database of known domains and to look for differences. Since the traditional method is sometimes insufficient, researchers have turned to a method called biomimicry.
Mailchimp has confirmed a miscreant gained access to one of its internal tools and used it to steal data belonging to 100-plus high-value customers. The clients were all in cryptocurrency and finance-related industries, according to Mailchimp
Japanese automation giant Yokogawa recently patched a series of vulnerabilities in control system products that, according to researchers, can be exploited for the disruption or manipulation of physical processes.
The funding round was led by Storm Ventures, with participation from Cervin Ventures, Engineering Capital, Sorenson Ventures, and various angel investors. The total funds raised by the company are $18.6 million.
The attackers also created new bank accounts and moved customers' funds into those accounts. Over $1 million of such stolen funds were shifted to hundreds of other accounts at Mahesh Bank and other financial institutions.
Cybersecurity experts debated the merits of the White House’s plans to revise NSPM-13, with some asserting that cyber operations will be dangerously slowed down if the White House becomes involved in the process.
When committing software projects to GitHub it remains crucial to ensure that secrets like your private tokens, API keys, and passwords are not accidentally committed to open source repositories as well.
“Customers, employees, and other stakeholders may be affected by the shutdown of several IT systems. The Nordex Group will provide further updates when more information is available,” the firm said.
GitHub has announced on Monday that it expanded its code hosting platform's secrets scanning capabilities for GitHub Advanced Security customers to block secret leaks automatically.
The widespread intrusions, which are believed to have commenced at the earliest in mid-2021 and continued as recently as February 2022, have been tied to a group tracked as Cicada, which is also known as APT10.
Alongside this latest round, the company is also disclosing for the first time an additional $20 million raised in the last six months, bringing the total to $80 million in the period.
The threat actor(s) behind these campaigns have been using 3LOSH to generate the obfuscated code responsible for the initial infection process. The same operator is likely distributing a variety of commodity RATs, such as AsyncRAT and LimeRAT.
UK high street retailer The Works was forced to shut some of its stores following a "cyber security incident" which saw hackers gaining unauthorized access to its systems.
SocGholish has been around longer than BLISTER, having already established itself well among threat actors for its advanced delivery framework. Reports show that its framework of attack has previously been used by threat actors from as early as 2020.
Designated as CVE-2022-22639, the vulnerability could allow root privilege escalation if successfully exploited. After discovering the flaw, we reported it to Apple, hence the release of a patch through the macOS Monterey 12.3 security update.
Apart from narcotics and money laundering services, which were the main focus, the underground market also offered stolen databases, forged documents, and hacking for hire services.
Hive ransomware gang is using a new IPfuscation tactic to hide its payload wherein they hide 64-bit Windows executables in the form of an array of ASCII IPv4 addresses. Additionally, the researchers spotted additional IPfuscation variants using IPv6 instead of IPv4 addresses, UUIDs, and MAC addresses, all operating in almost the same way.
According to Fortinet, BeastMode attempts to infect TOTOLINK routers by exploiting several vulnerabilities. The threat actors added the exploits just a week after the PoCs were publicly released on GitHub.
Ubuntu Security Notice 5365-1 - It was discovered that H2 was vulnerable to deserialization of untrusted data. An attacker could possibly use this issue to execute arbitrary code. It was discovered that H2 incorrectly handled some specially crafted connection URLs. An attacker could possibly use this issue to execute arbitrary code.
Ubuntu Security Notice 5364-1 - It was discovered that Waitress incorrectly handled certain requests. An attacker could possibly use this issue to expose sensitive information.
Red Hat Security Advisory 2022-1186-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-1185-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2022-1174-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Issues addressed include bypass, crlf injection, and denial of service vulnerabilities.
Email marketing service Mailchimp on Monday revealed a data breach that resulted in the compromise of an internal tool to gain unauthorized access to customer accounts and stage phishing attacks. The development was first reported by Bleeping Computer. The company, which was acquired by financial software firm Intuit in September 2021, told the publication that it became aware of the incident
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added the recently disclosed remote code execution (RCE) vulnerability affecting the Spring Framework, to its Known Exploited Vulnerabilities Catalog based on "evidence of active exploitation." The critical severity flaw, assigned the identifier CVE-2022-22965 (CVSS score: 9.8) and dubbed "Spring4Shell", impacts Spring
Germany's Federal Criminal Police Office, the Bundeskriminalamt (BKA), on Tuesday announced the official takedown of Hydra, the world's largest illegal dark web marketplace that has cumulatively facilitated over $5 billion in Bitcoin transactions to date. "Bitcoins amounting to currently the equivalent of approximately €23 million were seized, which are attributed to the marketplace," the BKA
A Chinese state-backed advanced persistent threat (APT) group known for singling out Japanese entities has been attributed to a new long-running espionage campaign targeting new geographies, suggesting a "widening" of the threat actor's targeting. The widespread intrusions, which are believed to have commenced at the earliest in mid-2021 and continued as recently as February 2022, have been tied
With the growth in digital transformation, the API management market is set to grow by more than 30% by the year 2025 as more businesses build web APIs and consumers grow to rely on them for everything from mobile apps to customized digital services. As part of strategic business planning, an API helps generate revenue by allowing customers access to the functionality of a website or computer
The notorious cybercrime group known as FIN7 has diversified its initial access vectors to incorporate software supply chain compromise and the use of stolen credentials, new research has revealed. "Data theft extortion or ransomware deployment following FIN7-attributed activity at multiple organizations, as well as technical overlaps, suggests that FIN7 actors have been associated with various
Between a series of recent high-profile cybersecurity incidents and the heightened geopolitical tensions, there's rarely been a more dangerous cybersecurity environment. It's a danger that affects every organization – automated attack campaigns don't discriminate between targets. The situation is driven in large part due to a relentless rise in vulnerabilities, with tens of thousands of
UK high street retailer The Works has shut some of its stores following a "cyber security incident" which saw hackers gain unauthorised access to its systems. Read more in my article on the Hot for Security blog.