Scammers exploiting Microsoft business notifications to launch attacks
This post examines a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.
1182 articles
This post examines a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.
Scammers are using Google ads to push fake versions of real websites – and they’re after business accounts and company data.
We explore how cybercriminals are targeting IT specialists searching for a popular network scanner, using the Interlock ransomware attack as an example.
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
This is your World Password Day reminder about how to create strong passwords and remember them.
An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Spoiler: nothing good. Along with pirated software, you’ll probably pick up a miner, stealer, or backdoor.
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
Cybercriminals behind the Fog ransomware publish leaked data along with the IP addresses of attacked computers.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
Despite being digital natives, 70% of millennials rarely verify online identities – exposing themselves to risks. Discover how to build safer online habits with expert insights from Kaspersky.
We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
A year after the ransomware attack on healthcare giant UnitedHealth Group, we’ve compiled all publicly available information about the incident and its aftermath.
Just a few hours before 2025, we recorded a surge in cryptominer distribution through video games. Interestingly, not only home PCs but also corporate machines were affected.
If you still think that Steam, Google Play, and the App Store are malware-free, then read this fascinating story about PirateFi and other hacker creations disguised as games.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.