The DeathStalker cyberspy group and its tool set
The DeathStalker group targets relatively small companies and their trade secrets.
242 articles
The DeathStalker group targets relatively small companies and their trade secrets.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
How attackers hunt for Battle.net accounts in World of Warcraft, aiming to get valuable content.
Your online finances need proper protection. Learn how to secure your PayPal account.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.
We examined the contents of Kaspersky’s CEO’s spam folder to find out what spammers and phishers think might entice him.
As governments worldwide implement support measures for pandemic-hit citizens and businesses, online scammers strive to cash in.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
This week, David Jacoby joins Dave and Jeff to discuss his recent talk at SAS at Home, covidication, and more.
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
With everyone stuck at home to avoid COVID-19 exposure, working, socializing, and even homeschooling online, cybercriminals see a smorgasbord of ways to exploit the situation.
We tell how the coronavirus scare is being exploited by phishers to attack companies and install malware.
Health-care facilities are struggling with the current coronavirus epidemic, so we must help them with cyberprotection. We are offering free six-month licenses for our core solutions.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Dave and Jeff discuss the recent news around hackable toys, politics in Tinder, and phishing campaigns in The Elder Scrolls Online.