Kaspersky Expertise Centers
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
885 articles
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
Tips on how to watch the UEFA Euro 2024 tournament while keeping your money safe and your mood good.
Two-factor authentication protects your account from theft — until you yourself give away your one-time password.
Threat actors are targeting hotel staff with malicious and phishing e-mails.
Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.
What are the most common MITRE ATT&CK techniques encountered in real-world incidents — and how to neutralize them? We investigate using statistics from Incident Response and MDR services!
Episode 346 of the Kaspersky Podcast takes a look at North Korean propaganda sweeping TikTok, Nudify app and more.
Can you catch malware by downloading files from Microsoft’s repositories on GitHub? Turns out, you can. Stay alert!
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
By hijacking domains with CNAME records and exploiting forgotten SPF records, attackers seize domains and use them for their own purposes.
Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Episode 342 of the Kaspersky podcast focuses on politics, AI meddling, YouTube and a governmental honey trap.
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
Another celebration… for scammers. How cybercriminals scam women ahead of March 8.
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
Getting what you pay for: cracked macOS apps fetch malicious code from DNS records to steal crypto
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.