PhishingSecurity How whaling attacks target top executives by admin December 10, 2025 by admin December 10, 2025 Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them… 0 FacebookTwitterPinterestEmail
PhishingSecurity An analysis of a shadow Telegram channel’s lifespan by admin December 9, 2025 by admin December 9, 2025 Telegram has won over users worldwide, and cybercriminals are no exception. While the average… 0 FacebookTwitterPinterestEmail
PhishingSecurity Nothing to steal? Let’s wipe. We’re analyzing the Shai Hulud 2.0 npm worm by admin December 3, 2025 by admin December 3, 2025 In September, a new breed of malware distributed via compromised Node Package Manager (npm)… 0 FacebookTwitterPinterestEmail
PhishingSecurity Analyzing the vulnerability landscape in Q3 2025 by admin December 3, 2025 by admin December 3, 2025 In the third quarter, attackers continued to exploit security flaws in WinRAR, while the… 0 FacebookTwitterPinterestEmail
PhishingSecurity New Tomiris tools and techniques: multiple reverse shells, Havoc, AdaptixC2 by admin November 28, 2025 by admin November 28, 2025 While tracking the activities of the Tomiris threat actor, we identified new malicious operations… 0 FacebookTwitterPinterestEmail
PhishingSecurity How NTLM is being abused in 2025 cyberattacks by admin November 26, 2025 by admin November 26, 2025 Just like the 2000s Flip phones grew popular, Windows XP debuted on personal computers,… 0 FacebookTwitterPinterestEmail
PhishingSecurity Kaspersky online shopping threat report 2025 by admin November 24, 2025 by admin November 24, 2025 The global e‑commerce market is accelerating faster than ever before, driven by expanding online… 0 FacebookTwitterPinterestEmail
PhishingSecurity ToddyCat APT’s new tools and techniques by admin November 21, 2025 by admin November 21, 2025 Introduction Email remains the main means of business correspondence at organizations. It can be… 0 FacebookTwitterPinterestEmail
PhishingSecurity What the dark web job market looked like in 2023–2025 by admin November 20, 2025 by admin November 20, 2025 In 2022, we published our research examining how IT specialists look for work on… 0 FacebookTwitterPinterestEmail
PhishingSecurity The Tsundere botnet uses the Ethereum blockchain to infect its targets by admin November 20, 2025 by admin November 20, 2025 Introduction Tsundere is a new botnet, discovered by our Kaspersky GReAT around mid-2025. We… 0 FacebookTwitterPinterestEmail