Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  • Filter
  • Time
  • Show
Clear All
new posts

  • The fourth horseman: CVE-2019-0797 vulnerability

    The fourth horseman: CVE-2019-0797 vulnerability

    In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis of this event led to us discovering a zero-day vulnerability in Link.

    More...
    See more | Go to post

  • Spam and phishing in 2018

    Spam and phishing in 2018

    2018 showed that cybercriminals continue to keep a close eye on global events and use them to achieve their goals. We have seen a steady increase in phishing attacks on cryptocurrency-related resources, and expect new scams to appear in 2019.

    More...
    See more | Go to post

  • A predatory tale: Who’s afraid of the thief?

    A predatory tale: Who’s afraid of the thief?

    Predator is a data stealer developed by Russian-speaking individuals. It’s being sold cheaply on Russian forums and has been detected many times in the wild.

    More...
    See more | Go to post

  • Financial Cyberthreats in 2018

    Financial Cyberthreats in 2018

    The presented report continues the series of Kaspersky Lab reports that provide an overview of how the financial threat landscape has evolved over the years. It covers the common phishing threats that users encounter, along with Windows-based and Android-based financial malware.

    More...
    See more | Go to post

  • Pirate matryoshka

    Pirate matryoshka

    Cybercriminals are always coming up with new kinds of fraud. In this particular case, they employed a method for delivering malicious content through torrent trackers to install adware on user computers.

    More...
    See more | Go to post

  • Mobile malware evolution 2018

    Mobile malware evolution 2018

    Users of mobile devices in 2018 faced what could be the strongest cybercriminal onslaught ever seen. Over the course of the year, we observed both new mobile device infection techniques and a step-up in the use of tried-and-tested distribution schemes (for example, SMS spam).

    More...
    See more | Go to post

  • How to Attack and Defend a Prosthetic Arm

    How to Attack and Defend a Prosthetic Arm

    Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm’s positions, etc. And just like other IoT devices, this valuable invention must be checked for vulnerabilities. In our research, we focused on those attack vectors that can be implemented without the arm owner’s knowledge.

    More...
    See more | Go to post

  • Threats to users of adult websites in 2018

    Threats to users of adult websites in 2018

    We examined malware disguised as pornographic content, and malware that hunts for credentials to access pornography websites. We looked at the threats that are attacking users across the internet in order to find out which popular websites might be dangerous to visit. Additionally, we checked our phishing and spam database to see if there is a lot of pornographic content on file and how is it used in the wild.

    More...
    See more | Go to post

  • ATM robber WinPot: a slot machine instead of cutlets

    ATM robber WinPot: a slot machine instead of cutlets

    In March 2018, we came across a fairly simple but effective piece of malware named WinPot. It was created to make ATMs by a popular ATM vendor to automatically dispense all cash from their most valuable cassettes. We called it ATMPot.

    More...
    See more | Go to post

  • DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign

    DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign

    This website for volunteers in Venezuela appeared online on February 6th. Only a few days later, on February 11th, the day after the public announcement of the initiative, another almost identical website appeared with a very similar domain name and structure.

    More...
    See more | Go to post
There are no articles in this category.
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • The fourth horseman: CVE-2019-0797 vulnerability
    by willie
    In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis of this event led to us discovering a zero-day vulnerability in Link.

    More...
    13-03-2019, 10:24
  • Spam and phishing in 2018
    by willie
    2018 showed that cybercriminals continue to keep a close eye on global events and use them to achieve their goals. We have seen a steady increase in phishing attacks on cryptocurrency-related resources, and expect new scams to appear in 2019.

    More...
    13-03-2019, 10:24
  • A predatory tale: Who’s afraid of the thief?
    by willie
    Predator is a data stealer developed by Russian-speaking individuals. It’s being sold cheaply on Russian forums and has been detected many times in the wild.

    More...
    13-03-2019, 10:24
  • Financial Cyberthreats in 2018
    by willie
    The presented report continues the series of Kaspersky Lab reports that provide an overview of how the financial threat landscape has evolved over the years. It covers the common phishing threats that users encounter, along with Windows-based and Android-based financial malware.

    More...
    13-03-2019, 10:24
  • Pirate matryoshka
    by willie
    Cybercriminals are always coming up with new kinds of fraud. In this particular case, they employed a method for delivering malicious content through torrent trackers to install adware on user computers.

    More...
    13-03-2019, 10:24
  • Mobile malware evolution 2018
    by willie
    Users of mobile devices in 2018 faced what could be the strongest cybercriminal onslaught ever seen. Over the course of the year, we observed both new mobile device infection techniques and a step-up in the use of tried-and-tested distribution schemes (for example, SMS spam).

    More...
    05-03-2019, 21:00
Working...
X