Lookalike domains and how to spot them
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
19 articles
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
APT discoveries, AI implications, Darknet wonders, and cyber immunity insights: CSW ’23 shaping the cybersecurity landscape of 2023.
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
The most active groups targeting companies, encrypting data, and demanding ransom.
CD Projekt confirms attack on internal systems. Hackers claim to have downloaded Cyberpunk 2077 and The Witcher 3 source code, and demand ransom.
The Lazarus cybercrime group uses traditional APT techniques to spread VHD ransomware.
Our experts detected a malware framework that cybercriminals use to attack various operating systems.
Even if a computer is physically isolated, data can be stolen from it using some very unusual methods.
MITRE tested our solutions in the APT29 evaluation. We explain what the test is, why and how it’s conducted, and what the results mean.
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
In this episode, Jeff sits down with Vicente Diaz of Kaspersky Lab’s GReAT to discuss a review of APTs in 2018 and what 2019 may hold.
Malefactors do not need to infect your computers with malware if they can just plug their devices right into your network.
More than 400 manufacturing companies became phishing targets.
How Kaspersky Endpoint Security for Business counters the latest threats
Kaspersky Lab has adopted its wildly successful ZETA Shield from its corporate solutions and is implementing the technology into Kaspersky Internet Security 2014, providing even more robust security for everyday
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that