How the adversary-in-the-middle technique is used in spearphishing attacks
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
70 articles
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
From the alarming rise of AI-powered cyberthreats to the often-overlooked human factor, discover how the interplay of technology and human behaviour shapes the future of cyber-defence in India.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
Four major studies presented by our experts at the SAS 2023 international conference.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
The BlueNoroff APT group has adopted methods to bypass the Mark-of-the-Web mechanism
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
Servers with the Zimbra Collaboration suit installed are being attacked via an archive unpacking tool.
Our experts studied the WinDealer malware created by the LuoYu APT group.
The Lazarus group continues to prey on cryptocurrency: cybercriminals distribute DeFi wallets with built-in backdoor.
How to protect your iPhone or Android smartphone from Pegasus and similar mobile APTs.
Our experts have discovered a malicious campaign targeting fintech companies.
At the SAS 2021 conference, our experts talked about the Tomiris backdoor, which appears to be linked to the DarkHalo group.
The most active groups targeting companies, encrypting data, and demanding ransom.
Cybercriminals are using steganography to hide their code and seek industrial data.
Our technologies prevented an attack. Expert analysis revealed the exploitation of two previously unknown vulnerabilities. What you need to know.
We developed a sandbox capable of emulating a company-specific system in an isolated environment.
We have released a new solution that provides businesses with code similarity analysis and gives technical evidence for APT attribution.
Kaspersky experts found the PhantomLance Trojan backdoor for Android in Google Play.
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.