Latest news with #Kaspersky


Bloomberg
3 hours ago
- Bloomberg
Russian Hackers Pose as Cyber Firm to Spy on Foreign Embassies
A notorious Russian hacking group is impersonating a prominent cybersecurity firm and using the country's internet providers to spy on foreign embassies, according to a report published Thursday by Microsoft Corp. The attackers, a group known as Turla or Secret Blizzard, engaged in a 'large scale' cyber-espionage campaign in which they used Russian internet service providers, or ISPs, to conduct their hacks, according to Microsoft. Turla hackers also disguised their malware to impersonate cybersecurity software from the Russian cybersecurity company Kaspersky. Kaspersky didn't immediately respond to a request for comment.


Zawya
7 hours ago
- Business
- Zawya
AmiViz extends Kaspersky alliance across GCC following Egypt success
Dubai, UAE: AmiViz, the Middle East's leading cybersecurity-focused value-added distributor, and global cybersecurity leader Kaspersky have announced the expansion of their successful partnership from Egypt into the wider GCC region. This development builds on years of strong collaboration in Egypt, where both companies have empowered partners with robust cybersecurity solutions while addressing a rapidly evolving threat landscape. The partnership in Egypt has proven to be a powerful model of synergy, combining Kaspersky's globally recognized security technologies with AmiViz's partner enablement capabilities and strong distribution network. With a solid foundation of trust, performance, and shared vision, the two companies are now extending their alliance across key GCC markets. 'Our collaboration with Kaspersky in Egypt has demonstrated the true power of partnership, driving growth, innovation, and trust in the cybersecurity space,' said Ilyas Mohammed, COO at AmiViz. 'With our strong partner ecosystem and digital-first approach, we're excited to scale this success across the GCC and deliver even greater value and protection to our customers.' This regional expansion reflects a mutual commitment to strengthening cybersecurity resilience through smarter partner engagement and broader access to cutting-edge solutions. AmiViz will accelerate Kaspersky's reach through its highly evolved distribution model and local expertise, while Kaspersky brings its extensive portfolio of threat intelligence and endpoint security to more organizations. 'As cybersecurity demand continues to grow across the Middle East, we're excited to expand our collaboration with AmiViz into the Gulf region, building on the success of our partnership in Egypt,' said Samer Malak, Head of Channel for Middle East, Turkiye and Africa at Kaspersky. 'Together, we aim to equip our partners with Kaspersky's award-winning portfolio, enabling them to better protect their customers and address evolving cybersecurity needs.' About AmiViz AmiViz is a leading cybersecurity-focused value-added distributor headquartered in the Middle East, with a unique marketplace designed to serve the interests of enterprise resellers and vendors. Our unwavering focus on cybersecurity solutions ensures unparalleled expertise and personalised service for our partners. At AmiViz, cybersecurity isn't an afterthought-it's our core mission. We deliver top-tier products and services that safeguard businesses. Our close collaboration with vendors, resellers, and consultants ensures tailored solutions that address regional challenges. We empower businesses to thrive in a digital world by providing cutting-edge tools, knowledge, and support. About Kaspersky Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them.


Gulf Business
16 hours ago
- Business
- Gulf Business
Crypto scam alert: 5 things to know about the new Google Forms fraud, says Kaspersky
Image: Getty Images/ For illustrative purposes Kaspersky researchers have flagged a new scam campaign targeting cryptocurrency users by abusing the legitimacy of Google Forms. Here's what you need to know: 1. The scam starts with a fake Google Forms confirmation Attackers are using Google Forms – a free tool typically used for surveys – to trigger automated confirmation emails. These emails appear to come from Google itself, tricking users into thinking they've received a legitimate crypto transaction alert. The form usually includes only one field: the user's email address. 2. Emails mimic crypto exchange notifications The phishing emails are carefully designed to look like alerts from a cryptocurrency exchange. They mention a pending crypto payout and urge users to click a link before the offer 'expires.' This manufactured urgency pushes recipients to act without verifying the source. 3. Clicking the link takes you to a scam site If the user clicks the link, they land on a website made to resemble a crypto transaction platform. Here, victims are asked to contact so-called 'blockchain support' and make a small commission payment in cryptocurrency to receive the fake transfer. Following this process often leads to loss of funds, as the entire transaction is fabricated. 4. The attack bypasses spam filters using trusted infrastructure Since the email is technically sent from a legitimate Google domain, it often passes through spam filters undetected. This makes the scam harder to identify. The combination of a real Google email address and familiar design elements can deceive even cautious users. 5. Stay vigilant Andrey Kovtun, Email Threats Protection group manager at Kaspersky, warns that 'the campaign demonstrates a cunning exploitation of a trusted platform.' Avoid clicking unexpected links Watch for suspicious details like unfamiliar Google Forms content Use reliable security tools to block fraudulent sites If an email promises free crypto but asks for payment first, it's likely a scam. Users should verify the source and never trust links blindly — even if the sender appears legitimate. Read:

IOL News
a day ago
- Business
- IOL News
Tax season scams: How institutions can stay one step ahead
South Africans continue to meet their tax filing deadlines, cybercriminals have unleashed a wave of sophisticated scams Image: Supplied As South Africans continue to meet their tax filing deadlines, cybercriminals have unleashed a wave of sophisticated scams designed to exploit both individuals and institutions. "The latest scam is a SMS indicating that SARS is conducting an audit on a Tax refund. The link leads you to a phishing website, aimed at stealing your information. See the scam prototype here," the revenue service warned taxpayers earlier this year. According to cybersecurity firm Kaspersky, phishing "accounted for 67% of cyber incidents among South African organisations over the past year, with a 29% year-on-year increase in such scams recorded as tax season opened". Sameer Kumandan, Managing Director of data firm SearchWorks, says scammers are mimicking SARS communications with 'unprecedented' accuracy "Scammers are mimicking real SARS communication down to the last detail - and unless organisations strengthen their verification processes, they risk being caught off guard,' Kumandan said. Kumandan further warned institutions that failure to upgrade identity verification and monitoring systems could expose them to serious financial and reputational risks during this high-pressure period. "For businesses, especially accountable institutions handling large data volumes and transactions, the risks are twofold: they may be targeted directly or indirectly impacted through compromised clients,". Video Player is loading. Play Video Play Unmute Current Time 0:00 / Duration -:- Loaded : 0% Stream Type LIVE Seek to live, currently behind live LIVE Remaining Time - 0:00 This is a modal window. Beginning of dialog window. Escape will cancel and close the window. Text Color White Black Red Green Blue Yellow Magenta Cyan Transparency Opaque Semi-Transparent Background Color Black White Red Green Blue Yellow Magenta Cyan Transparency Opaque Semi-Transparent Transparent Window Color Black White Red Green Blue Yellow Magenta Cyan Transparency Transparent Semi-Transparent Opaque Font Size 50% 75% 100% 125% 150% 175% 200% 300% 400% Text Edge Style None Raised Depressed Uniform Dropshadow Font Family Proportional Sans-Serif Monospace Sans-Serif Proportional Serif Monospace Serif Casual Script Small Caps Reset restore all settings to the default values Done Close Modal Dialog End of dialog window. Advertisement Video Player is loading. Play Video Play Unmute Current Time 0:00 / Duration -:- Loaded : 0% Stream Type LIVE Seek to live, currently behind live LIVE Remaining Time - 0:00 This is a modal window. Beginning of dialog window. Escape will cancel and close the window. Text Color White Black Red Green Blue Yellow Magenta Cyan Transparency Opaque Semi-Transparent Background Color Black White Red Green Blue Yellow Magenta Cyan Transparency Opaque Semi-Transparent Transparent Window Color Black White Red Green Blue Yellow Magenta Cyan Transparency Transparent Semi-Transparent Opaque Font Size 50% 75% 100% 125% 150% 175% 200% 300% 400% Text Edge Style None Raised Depressed Uniform Dropshadow Font Family Proportional Sans-Serif Monospace Sans-Serif Proportional Serif Monospace Serif Casual Script Small Caps Reset restore all settings to the default values Done Close Modal Dialog End of dialog window. Next Stay Close ✕ To stay ahead of fraudsters, Kumandan has recommended four key focus areas for accountable institutions: Strengthen identity verification processes Tax-season scams often involve impersonation - making robust identity verification a frontline defence. Accountable institutions should ensure their Know Your Customer (KYC) protocols include multi-factor authentication (MFA), biometric ID verification, and real-time document validation against trusted data sources. Dormant, inactive, or high-risk accounts should be reverified before any transactional activity is permitted. Keep customer records and risk profiles current Fraud often exploits outdated or incomplete records. Institutions should continuously refresh customer data and risk scores, synchronise records across departments, and use machine learning tools to flag anomalies. Data hygiene is more than a compliance requirement - it's a strategic shield against social engineering. Leverage technology for real-time monitoring Transaction monitoring shouldn't be reactive. Use real-time analytics to flag unexpected login behaviour (such as geolocation shifts or device changes), unusually high transaction volumes, or rapid movement in new accounts. Institutions should also monitor for red flags around SARS refund timelines, when fraudulent withdrawals are most likely to spike. Prioritise education and fraud awareness Internal teams and clients are often the weakest security link - but also the most scalable defence. SARS regularly publishes updated scam alerts on its website, which institutions should actively circulate. In-house phishing simulations, seasonal fraud briefings, and client education campaigns can significantly reduce vulnerability. Ultimately, tax season is a pressure test - not only for compliance teams, but for the systems and habits that underpin them. Institutions that invest in proactive monitoring, smarter verification, and continuous education are far better positioned to protect their clients and their reputations long after the filing deadline has passed. IOL Business Get your news on the go, click here to join the IOL News WhatsApp channel


Business Recorder
2 days ago
- Business
- Business Recorder
Kaspersky discovers new scam attacks through Google Forms
ISLAMABAD: A leading cyber security company has discovered a new wave of scam attacks that use Google Forms to target crypto users. According to a report released by Kaspersky's researchers on Tuesday, knowing the email address of the potential victim, the attackers send a scam email through Google Forms, which is designed to appear as a notification from a crypto exchange service. Users are invited to receive an alleged transfer in cryptocurrency by following a link to a website where they are instructed to contact 'blockchain support' and make a 'commission' payment in crypto to receive the transfer. Following these instructions could lead to the loss of funds, as the whole 'transfer' story is a hoax. The attackers used Google Forms – a free tool for online surveys – to create a short questionnaire with just one slot to fill in: the email address. The attackers themselves input the victim's email address into the form, and then Google Forms sends a questionnaire submission confirmation email to the victim. The attackers crafted this form submission confirmation to look like a notification from a crypto transaction service – indicating a sum to allegedly be paid out, urging the user to click on the link to receive the payout before it 'expires.' The scam email contains Google Forms attributes, such as a header with Google Forms logo, a link to the questionnaire (which the user never filled in), and the field value that had been submitted. The attackers bank on the fact that the email passes through spam filters, since it was sent from a legitimate Google address and the user is tricked by a catchy headline. Copyright Business Recorder, 2025