Home Search
kaspersky - search results
If you're not happy with the results, please do another search
Ready to have company’s source code examined: Kaspersky to US government
Following the draft of the new bill by the United States Senate that seeks ban on all Kaspersky Labs products from Department of Defense...
How to Prevent Steganography Attacks
Cybercriminals are well-versed in shifting their hacking techniques and adapting new threat strategies to specific situations and opportunities. Threat actors often leverage various tactics...
Ubisoft Suffers Data Breach After Cyberattack
Ubisoft confirmed a data breach after sustaining a cyberattack. The French video game stated that unknown hackers compromised its IT infrastructure to steal gamers’...
Researchers Uncover North Korean Threat Actor Group TA406 Targeting Diplomats
Security researchers uncovered a cyberespionage campaign linked to North Korean actors, targeting foreign policy experts, journalists, and nongovernmental organizations (NGOs). According to a cyberthreat research...
DDoS Attack on VoIP Provider Telnyx Impacts Global Telephony Services
Cybercriminals often leverage Distributed Denial of Services (DDoS) techniques to disrupt critical services of global organizations. Days after a massive DDoS attack on multiple...
North Korea’s Lazarus Group Targets IT Supply Chains with MATA Malware
Lazarus, a notorious advanced persistent threat (APT) group that needs no introduction in the cyberthreat landscape, strikes again with improved malware variants. The North...
BloodyStealer Steals Gamers’ Account Data to Sell on Dark Web Forums
Kaspersky researchers have discovered an advanced Trojan, called the BloodyStealer, sold on darknet forums and used to harvest gamers’ accounts across widely used gaming...
The Importance of Team Diversity in Detecting Phishing Scams
An email subject line catches a user’s interest. The user clicks through and gets compromised. This is a classic phishing attack; it remains one...
Attackers Use Fake FMWhatsapp to Spread Triada Trojan
From data privacy violations to fake applications, WhatsApp has been in the news for various reasons since the beginning of 2021. The popular instant...
Different Types of Ethical Hackers: White, Black, and Grey Hats Explained
There are several types of ethical hackers depending on the hacker’s intent and goal. This article highlights the concepts of hacking and the different types of...