Overcooking the phish
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
Our developments, products, research, patents and expert teams harnessed for AI.
We’ve discovered a new Trojan that’s very selective about its victims.
AI is changing the game, but are we ready for the risks? Discover key insights from our APAC Cybersecurity Weekend 2024 on how to tackle AI-driven threats and secure the future.
An Office 365 security alert as bait in a phishing email.
Autumn is here, kids are going back to school and also meeting up with friends in their favorite online games. With that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most likely to encounter.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
Why and how to create a local backup of cloud data, taking Notion as an example.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
Going on vacation? We’ve compiled a traveler’s guide to help you have an enjoyable safe time and completely get away from the routine.
The new AI function in Microsoft Windows has already been dubbed a “security nightmare” on the internet. What risks does it carry, and how to stay safe?
We discuss key aspects of WhatsApp’s security and privacy, and how to configure this messenger to enhance protection.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.