How to sell your TV without losing your shirt (and banking data)
Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.
833 articles
Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!
Episode 346 of the Kaspersky Podcast takes a look at North Korean propaganda sweeping TikTok, Nudify app and more.
Can you catch malware by downloading files from Microsoft’s repositories on GitHub? Turns out, you can. Stay alert!
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Episode 342 of the Kaspersky podcast focuses on politics, AI meddling, YouTube and a governmental honey trap.
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
Another celebration… for scammers. How cybercriminals scam women ahead of March 8.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Cybersecurity trends to consider and new threats to protect against in 2024.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
Episode 328 of the Kaspersky podcast includes historic EU A.I regulation deal, Evil ChatGPT? and even more A.I!
During the pre-holiday period, attackers are sending invoices to companies for the delivery of non-existent documents.