Fake LinkedIn notifications

Fake LinkedIn notifications

We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait. Roman DedenokNovember 10, 2021 Have you disabled annoying e-mail notifications from social networks? We think that’s great! We even periodically offer advice on how to...
Kaspersky CyberTrace as a threat intelligence platform

Kaspersky CyberTrace as a threat intelligence platform

We based our new threat intelligence management platform on Kaspersky CyberTrace. Mikhail MoskvinNovember 10, 2021 In terms of daily workload, few infosec roles compare with that of a security operations center (SOC) analyst. We know this firsthand, which is why we...
New tricks of the Trickbot Trojan

New tricks of the Trickbot Trojan

Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals. Hugh AverOctober 20, 2021 Exactly five years ago, in October 2016, our solutions first encountered a Trojan named Trickbot (aka TrickLoader or Trickster)....
Eight steps to freedom: How to detach from social networks

Eight steps to freedom: How to detach from social networks

Free yourself from social media and start living again. Hugh AverOctober 20, 2021 Social networks becoming a burden? When out-of-control social media taxes your nerves, steals your focus and distracts you from important tasks, it’s time to do a digital detox. Today we...
How to analyze a suspicious e-mail

How to analyze a suspicious e-mail

If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how. Yaroslav AndreevOctober 22, 2021 The signs of phishing can be obvious — a mismatch between the sender’s address and that of their supposed company, logical...