Announcement

Collapse
No announcement yet.

The fourth horseman: CVE-2019-0797 vulnerability

Collapse
X
Collapse

  • The fourth horseman: CVE-2019-0797 vulnerability

    In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis of this event led to us discovering a zero-day vulnerability in Link.

    More...
      Posting comments is disabled.

    Categories

    Collapse

    Article Tags

    Collapse

    Latest Articles

    Collapse

    • The fourth horseman: CVE-2019-0797 vulnerability
      by willie
      In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis of this event led to us discovering a zero-day vulnerability in Link.

      More...
      13-03-2019, 10:24
    • Spam and phishing in 2018
      by willie
      2018 showed that cybercriminals continue to keep a close eye on global events and use them to achieve their goals. We have seen a steady increase in phishing attacks on cryptocurrency-related resources, and expect new scams to appear in 2019.

      More...
      13-03-2019, 10:24
    • A predatory tale: Who’s afraid of the thief?
      by willie
      Predator is a data stealer developed by Russian-speaking individuals. It’s being sold cheaply on Russian forums and has been detected many times in the wild.

      More...
      13-03-2019, 10:24
    • Financial Cyberthreats in 2018
      by willie
      The presented report continues the series of Kaspersky Lab reports that provide an overview of how the financial threat landscape has evolved over the years. It covers the common phishing threats that users encounter, along with Windows-based and Android-based financial malware.

      More...
      13-03-2019, 10:24
    • Pirate matryoshka
      by willie
      Cybercriminals are always coming up with new kinds of fraud. In this particular case, they employed a method for delivering malicious content through torrent trackers to install adware on user computers.

      More...
      13-03-2019, 10:24
    • Mobile malware evolution 2018
      by willie
      Users of mobile devices in 2018 faced what could be the strongest cybercriminal onslaught ever seen. Over the course of the year, we observed both new mobile device infection techniques and a step-up in the use of tried-and-tested distribution schemes (for example, SMS spam).

      More...
      05-03-2019, 21:00
    Working...
    X