Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  • Filter
  • Time
  • Show
Clear All
new posts

  • Spam and phishing in Q1 2019

    Spam and phishing in Q1 2019

    In Q1 2019, the average share of spam in global mail traffic rose by 0.06 p.p. to 55.97%, and the Anti-Phishing system prevented more than 111,832,308 redirects to phishing sites, up 35,220,650 in comparison with the previous reporting period.

    More...
    See more | Go to post

  • ScarCruft continues to evolve, introduces Bluetooth harvester

    ScarCruft continues to evolve, introduces Bluetooth harvester

    After publishing our initial series of blogposts back in 2016, we have continued to track the ScarCruft threat actor. ScarCruft is a Korean-speaking and allegedly state-sponsored threat actor that usually targets organizations and companies with links to the Korean peninsula.

    More...
    See more | Go to post

  • The 2019 DBIR is out

    The 2019 DBIR is out

    We are happy to support a large, voluntary, collaborative effort like the 2019 Data Breach Investigations Report. While our data contribution is completely anonymous, it is based in some of the 2018 data set that our private report customers receive.

    More...
    See more | Go to post

  • FIN7.5: the infamous cybercrime rig “FIN7” continues its activities

    FIN7.5: the infamous cybercrime rig “FIN7” continues its activities

    In 2018-2019, researchers of Kaspersky Lab’s Global Research and Analysis Team analyzed various campaigns that used the same Tactics Tools and Procedures (TTPs) as the historic FIN7, leading the researchers to believe that this threat actor had remained active despite the 2018 arrests.

    More...
    See more | Go to post

  • APT trends report Q1 2019

    APT trends report Q1 2019

    This is our latest summary of APT activity, based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. It aims to highlight the significant events and findings that we feel people should be aware of.

    More...
    See more | Go to post

  • I know what you did last summer, MuddyWater blending in the crowd

    I know what you did last summer, MuddyWater blending in the crowd

    This report details a collection of tools used by MuddyWater threat actor on its targets after initial infection. It also details deceptive techniques used to divert investigations once attack tools have been deployed inside victim systems.

    More...
    See more | Go to post

  • Operation ShadowHammer: a high-profile supply chain attack

    Operation ShadowHammer: a high-profile supply chain attack

    In late March 2019, we briefly highlighted our research on ShadowHammer attacks, a sophisticated supply chain attack involving ASUS Live Update Utility. Now it is time to share more details about the research with our readers.

    More...
    See more | Go to post

  • New zero-day vulnerability CVE-2019-0859 in win32k.sys

    New zero-day vulnerability CVE-2019-0859 in win32k.sys

    In March 2019, our automatic Exploit Prevention (EP) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis of this event led to us discovering a zero-day vulnerability in Link

    More...
    See more | Go to post

  • Large-scale SIM swap fraud

    Large-scale SIM swap fraud

    If someone steals your phone number, you’ll face a lot of problems, especially because most of our modern two-factor authentication systems are based on SMSs that can be intercepted using this technique.


    More...
    See more | Go to post

  • Gaza Cybergang Group1, operation SneakyPastes

    Gaza Cybergang Group1, operation SneakyPastes

    Gaza Cybergang(s) is a politically motivated Arabic-language cyberthreat actor, actively targeting the Middle East North Africa region. Group1 is the least sophisticated of the three attack Gaza groups.

    More...
    See more | Go to post
There are no articles in this category.
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • Spam and phishing in Q1 2019
    by willie
    In Q1 2019, the average share of spam in global mail traffic rose by 0.06 p.p. to 55.97%, and the Anti-Phishing system prevented more than 111,832,308 redirects to phishing sites, up 35,220,650 in comparison with the previous reporting period.

    More...
    18-05-2019, 06:33
  • ScarCruft continues to evolve, introduces Bluetooth harvester
    by willie
    After publishing our initial series of blogposts back in 2016, we have continued to track the ScarCruft threat actor. ScarCruft is a Korean-speaking and allegedly state-sponsored threat actor that usually targets organizations and companies with links to the Korean peninsula.

    More...
    18-05-2019, 06:33
  • The 2019 DBIR is out
    by willie
    We are happy to support a large, voluntary, collaborative effort like the 2019 Data Breach Investigations Report. While our data contribution is completely anonymous, it is based in some of the 2018 data set that our private report customers receive.

    More...
    18-05-2019, 06:33
  • FIN7.5: the infamous cybercrime rig “FIN7” continues its activities
    by willie
    In 2018-2019, researchers of Kaspersky Lab’s Global Research and Analysis Team analyzed various campaigns that used the same Tactics Tools and Procedures (TTPs) as the historic FIN7, leading the researchers to believe that this threat actor had remained active despite the 2018 arrests.

    More...
    18-05-2019, 06:33
  • APT trends report Q1 2019
    by willie
    This is our latest summary of APT activity, based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. It aims to highlight the significant events and findings that we feel people should be aware of.

    More...
    01-05-2019, 19:56
  • I know what you did last summer, MuddyWater blending in the crowd
    by willie
    This report details a collection of tools used by MuddyWater threat actor on its targets after initial infection. It also details deceptive techniques used to divert investigations once attack tools have been deployed inside victim systems.

    More...
    01-05-2019, 19:56
Working...
X