Lookalike domains and how to spot them
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
32 articles
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
The most active groups targeting companies, encrypting data, and demanding ransom.
Blocking a threat isn’t enough; you have to understand and reconstruct the whole infection chain.
CD Projekt confirms attack on internal systems. Hackers claim to have downloaded Cyberpunk 2077 and The Witcher 3 source code, and demand ransom.
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Our experts detected a malware framework that cybercriminals use to attack various operating systems.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
MITRE tested our solutions in the APT29 evaluation. We explain what the test is, why and how it’s conducted, and what the results mean.
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
In this episode, Jeff sits down with Vicente Diaz of Kaspersky Lab’s GReAT to discuss a review of APTs in 2018 and what 2019 may hold.
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
More than 400 manufacturing companies became phishing targets.
A traditional approach to cybersecurity is no longer good enough. Dealing with advanced threats requires advanced tools such as endpoint detection and response.
How Kaspersky Endpoint Security for Business counters the latest threats.
Think you can do better than a machine-learning algorithm and hunt down threats in the making? Take our quiz and find out!
The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it’s not the only one.
Kaspersky Lab’s security experts released a detailed report on Operation Ghoul – a targeted campaign aimed primarily at businesses in the Middle East and Europe.