Overcooking the phish
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
1182 articles
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Autumn is here, kids are going back to school and also meeting up with friends in their favorite online games. With that in mind, we have just carried out one of our biggest ever studies of the threats young gamers are most likely to encounter.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
Today we tell you about our practices for releasing new products, and also updating existing releases, which reduce the risk of large-scale incidents.
Kaspersky experts examined the security of public Wi-Fi hotspots in Paris on the eve of the Olympics.
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Medium-sized businesses increasingly find themselves on the receiving end of targeted attacks. What tools does one need when basic security proves inadequate?
Today we talk about our five main centers of expertise and their contribution to Kaspersky’s products, threat intelligence and expert cybersecurity services.
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
Almost six out of ten passwords can be cracked in less than an hour using either a modern graphics card or cloud services. All it costs is a few dollars and some free time. How this is possible and what to do about it is the topic of our study.
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
Two-factor authentication protects your account from theft — until you yourself give away your one-time password.
We discuss key aspects of WhatsApp’s security and privacy, and how to configure this messenger to enhance protection.
Threat actors are targeting hotel staff with malicious and phishing e-mails.
Fake tech-support has long been a trend in fraud worldwide. We explain how it works, and what you can do to protect yourself.
Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.