Kaspersky CyberTrace as a threat intelligence platform

Kaspersky CyberTrace as a threat intelligence platform

We based our new threat intelligence management platform on Kaspersky CyberTrace. Mikhail MoskvinNovember 10, 2021 In terms of daily workload, few infosec roles compare with that of a security operations center (SOC) analyst. We know this firsthand, which is why we...
New tricks of the Trickbot Trojan

New tricks of the Trickbot Trojan

Over the past five years, the Trickbot banking Trojan has evolved into a multifunctional tool for cybercriminals. Hugh AverOctober 20, 2021 Exactly five years ago, in October 2016, our solutions first encountered a Trojan named Trickbot (aka TrickLoader or Trickster)....
Eight steps to freedom: How to detach from social networks

Eight steps to freedom: How to detach from social networks

Free yourself from social media and start living again. Hugh AverOctober 20, 2021 Social networks becoming a burden? When out-of-control social media taxes your nerves, steals your focus and distracts you from important tasks, it’s time to do a digital detox. Today we...
How to analyze a suspicious e-mail

How to analyze a suspicious e-mail

If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how. Yaroslav AndreevOctober 22, 2021 The signs of phishing can be obvious — a mismatch between the sender’s address and that of their supposed company, logical...
How to download Windows 11 while avoiding malware

How to download Windows 11 while avoiding malware

Scammers are distributing malware and adware made to look like Windows 11. Anton V. IvanovJuly 23, 2021 Microsoft hasn’t yet released Windows 11, but the new operating system is already available for download and preview. Cybercriminals, of course, are exploiting...