Kaspersky has uncovered a sophisticated evolution of phishing techniques used by cybercriminals to bypass two-factor authentication (2FA), a crucial security measure designed to protect online accounts. Despite the widespread adoption of 2FA by many websites and its mandatory implementation by numerous organizations, attackers have developed advanced methods, combining phishing withRead More…

Researchers at Kaspersky keep a close eye on Advanced Persistent Threats (APTs) and are observing 19 active threat actors that currently target organizations within the Middle East. Whilst these threat actors target a wide range of entities, Kaspersky researchers identified government, telecommunications and diplomatic institutions as the top targets inRead More…

Kaspersky has announced the release of its upgraded iOS and Android mobile apps, with updates focusing on security, privacy and improved usability. Among new features available in the iOS app are the Security Scan button, Private Browsing option and a Siri-shortcut feature,Read More…

Amid rising concerns about Telegram’s security, the Kaspersky Digital Footprint Intelligence team analyzed shadow Telegram channels. Their findings reveal a troubling trend: cybercriminals are increasingly using Telegram as a platform for the underground market activities. Cybercriminals actively operate channels and groups on Telegram dedicated to discussing fraud schemes, distributing leaked databases, andRead More…

Public Wi-Fi is quite popular at cafes, airports, or abroad during vacations or business trips. Despite the convenience and perceived necessity of staying connected, these common situations require vigilance to ensure the safety and protection of personal data. To navigate potential risks safely, Kaspersky experts have crafted a set ofRead More…

Small to medium-sized businesses (SMBs) are increasingly being targeted by cybercriminals, according to the latest Kaspersky’s report released today. The most prevalent form of attack continues to be Trojans, which are especially hazardous because, unlike viruses, they cannot self-replicate, and they usually mimic legitimate software.Read More…