How criminals disguise URLs | Kaspersky official blog
Credit to Author: Roman Dedenok| Date: Tue, 12 Dec 2023 17:45:40 +0000
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
Read moreCredit to Author: Roman Dedenok| Date: Tue, 12 Dec 2023 17:45:40 +0000
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
Read moreCredit to Author: Roman Dedenok| Date: Tue, 25 Apr 2023 20:16:45 +0000
What conversation hijacking scheme is and how you can protect your employees from it.
Read moreCredit to Author: Editorial Team| Date: Wed, 29 Mar 2023 08:42:29 +0000
Transport-based Enforcement System: Microsoft's mechanism to prevent mail delivery from outdated Exchange servers to Exchange Online.
Read moreCredit to Author: Roman Dedenok| Date: Thu, 23 Mar 2023 10:00:03 +0000
Cybercriminals are preying on corporate login credentials by hiding phishing links in files on hijacked SharePoint servers.
Read moreCredit to Author: Enoch Root| Date: Mon, 08 Aug 2022 08:32:29 +0000
The lessons learned from one of the most notorious virus stories — the ILOVEYOU outbreak of May 2000.
Read moreCredit to Author: Roman Dedenok| Date: Thu, 21 Jul 2022 12:11:24 +0000
One of the phishing tricks that company employees need to be aware of is e-mails marked safe in the body.
Read moreCredit to Author: Andrey Kovtun| Date: Tue, 19 Apr 2022 18:02:11 +0000
Kaspersky has unveiled a significant spike in activity from a malicious spam e-mail campaign, which spreads Emotet and Qbot malware and targets corporate users.
Read moreCredit to Author: Roman Dedenok| Date: Tue, 22 Feb 2022 14:52:57 +0000
What company employees should know about fake notifications about account security.
Read more