Trojan-stealer discovered in spam mailouts to businesses
Cybercriminals are sending to companies high-quality imitations of business letters to with a spy trojan in the attachment.
Cybercriminals are sending to companies high-quality imitations of business letters to with a spy trojan in the attachment.
We explain how the Harly Trojan subscriber targets Android users.
Introducing our new Transparency Center format and the opening of two more facilities in Europe.
Kaspersky Endpoint Detection and Response Optimum – superior enterprise-cybersecurity, with no fluff.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
It’s time to update! Microsoft patches 64 vulnerabilities in a variety of products and components — from Windows and Office to Defender and Azure.
An unusual case of an attack executed by weaponizing legit video game code.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Highlights from “The nature of cyber incidents” report by the Kaspersky GERT team.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
How things are privacy-wise on the social network Poparazzi.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.