Common initial attack vectors
How attackers are most apt to get into target companies’ infrastructure.
900 articles
How attackers are most apt to get into target companies’ infrastructure.
Gamer accounts are in demand on the underground market. Proof positive is BloodyStealer, which steals account data from popular gaming stores.
Guard against ransomers who encrypt your files and demand payment for their safe return.
Adware, Trojans, and other malware aren’t the only reasons not to download illegal games.
This week on the Kaspersky podcast, Ahmed, Dave, and Jeff discuss a breach at T-Mobile, John Oliver’s rant on ransomware, garbage trucks finding Wi-Fi, and more.
Cybercriminals are offering ban-as-a-service for blocking Instagram users.
Why using a corporate mail account for personal matters is not a good idea
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
LockBit 2.0 ransomware can spread across a local network through group policies created on a hijacked domain controller.
In computer games, where does the money go — and what can you do about it?
Scammers pretend to represent brands on Twitter and lure customers onto phishing websites. Here’s how to avoid it.
Spammers are using malicious macros to distribute IcedID and Qbot banking malware in seemingly important documents.
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
How ontologies can provide the world with greater, faster protection from cyberthreats and more.
How to protect your clients from cybercriminals impersonating your company on Twitter.
Many companies throw out information that can pose a security or reputational risk.
A malicious script in the WeakAuras add-on can eradicate several days of farming in WoW Classic in a second.
Scammers continue to target cryptoinvestors, this time by luring their victims with fake ICOs for “hype” coins.
If your phone falls into the hands of criminals, do not panic. Here is how to protect your data.