Mitigating the risks of residential proxies | Kaspersky official blog
Credit to Author: Stan Kaminsky| Date: Fri, 12 Apr 2024 16:12:13 +0000
What are residential proxies, and how can attacks routed through them be tracked?
Read moreCredit to Author: Stan Kaminsky| Date: Fri, 12 Apr 2024 16:12:13 +0000
What are residential proxies, and how can attacks routed through them be tracked?
Read moreCredit to Author: Alexey Sadylko| Date: Wed, 03 Apr 2024 11:13:51 +0000
Hackers breached esports players during the Apex Legends Global Series, forcing the tournament to be postponed. We explore how this could have been prevented, and offer protection solutions for gamers.
Read moreCredit to Author: Nikolay Pankov| Date: Mon, 01 Apr 2024 10:31:18 +0000
What cybersecurity lessons can we learn from the Jason Statham movie "The Beekeeper"?
Read moreCredit to Author: Stan Kaminsky| Date: Fri, 22 Mar 2024 16:39:46 +0000
What measures should IT and InfoSec services take to “harden” against LotL attacks that leverage LOLBins and LOLBAS?
Read moreCredit to Author: Alanna Titterington| Date: Thu, 21 Mar 2024 19:43:39 +0000
We discuss commercial spyware — particularly the capabilities of the most well-known instances: Pegasus, DevilsTongue, Predator, Subzero, Heliconia, and Reign.
Read moreCredit to Author: Alanna Titterington| Date: Mon, 18 Mar 2024 18:08:43 +0000
We explain what SIM swapping is, how such attacks can hurt organizations, and how to guard against them.
Read moreCredit to Author: Alanna Titterington| Date: Fri, 15 Mar 2024 12:49:58 +0000
PMKID interception is the simplest, most effective, and least noticeable way to hack Wi-Fi networks. We explain how this attack works and how to defend against it.
Read moreCredit to Author: Alanna Titterington| Date: Mon, 11 Mar 2024 17:51:17 +0000
What is pig butchering: how this scam operates, and how to protect yourself from fake investments in cryptocurrencies.
Read more