Meet the Trojan subscribers hungry to sign you up
We explain how Android users fall victim to Trojan subscribers Jocker, MobOk, Vesub and GriftHorse.
1182 articles
We explain how Android users fall victim to Trojan subscribers Jocker, MobOk, Vesub and GriftHorse.
May 2022 Introduction Ransomware, as the name suggests, is malicious software designed to block access to a computer system or encrypt its data until a sum of money (a ransom)
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
The Lazarus group continues to prey on cryptocurrency: cybercriminals distribute DeFi wallets with built-in backdoor.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
Our experts investigated the activity and studied tools of ransomware gang BlackCat.
Meet Jeffrey Esposito, Head of Regional Social Media at Kaspersky.
A Trojan that masquerades as a banking app and imitates phone conversations with bank employees.
Researchers found critical vulnerability in Spring, a popular Java framework. Here’s how it works, why it’s dangerous and how to protect from it.
In 2021 there were fewer attacks on smartphones and tablets than in 2020. But that’s no reason to relax, and here’s why.
Hackers from Lapsus$ group claim they breached Okta, a major provider of access management systems.
What is a seed phrase, how scammers use it to steal cryptowallets, and how to protect your MetaMask account.
From Conti ransomware leak to NFT and beyond – it’s episode 242 of the Categories: News
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
We reveal more cunning cybercriminal tricks and explain how to guard against scams.
Anti-phishing lessons: what company employees should know about fake notifications about account security.
How threat intelligence helps prevent cyberattacks on enterprises.