Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  • Filter
  • Time
  • Show
Clear All
new posts

  • A Zebrocy Go Downloader

    A Zebrocy Go Downloader

    The Sofacy subset we identify as “Zebrocy” continues to target Central Asian government related organizations, both in-country and remote locations, along with a new middle eastern diplomatic target. And, as predicted, they continue to build out their malware set with a variety of scripts and managed code.

    More...
    See more | Go to post

  • The world’s southernmost security conference

    The world’s southernmost security conference

    In November I had the privilege of participating in a conference that can rightfully be labelled the world's southernmost. It is called "Patagonia Hacking" and it is organized in the Chilean city of Punta Arenas

    More...
    See more | Go to post

  • Remotely controlled EV home chargers – the threats and vulnerabilities

    Remotely controlled EV home chargers – the threats and vulnerabilities

    There are lots of home charger vendors. Some of them, such as ABB or GE, are well-known brands, but some smaller companies have to add ‘bells and whistles’ to their products to attract customers. One of the most obvious and popular options in this respect is remote control of the charging process. But from our point of view this sort of improvement can make chargers an easy target for a variety of attacks.

    More...
    See more | Go to post

  • Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)

    Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)

    In October 2018, our AEP systems detected an attempt to exploit a vulnerability in the Microsoft Windows. Further analysis led us to uncover a zero-day vulnerability in ntoskrnl.exe.

    More...
    See more | Go to post

  • DarkVishnya: Banks attacked through direct connection to local network

    DarkVishnya: Banks attacked through direct connection to local network

    In 2017-2018, Kaspersky Lab specialists were invited to research a series of cybertheft incidents. Each attack had a common springboard: an unknown device directly connected to the company’s local network.

    More...
    See more | Go to post

  • APT review of the year

    APT review of the year

    What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer. Still, with the benefit of hindsight, let’s try to approach the problem from different angles to get a better understanding of what went on.

    More...
    See more | Go to post

  • Remotely controlled EV home chargers – the threats and vulnerabilities

    Remotely controlled EV home chargers – the threats and vulnerabilities

    There are lots of home charger vendors. Some of them, such as ABB or GE, are well-known brands, but some smaller companies have to add ‘bells and whistles’ to their products to attract customers. One of the most obvious and popular options in this respect is remote control of the charging process. But from our point of view this sort of improvement can make chargers an easy target for a variety of attacks.

    More...
    See more | Go to post

  • APT review of the year

    APT review of the year

    What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer. Still, with the benefit of hindsight, let’s try to approach the problem from different angles to get a better understanding of what went on.

    More...
    See more | Go to post

  • KoffeyMaker: notebook vs. ATM

    KoffeyMaker: notebook vs. ATM

    Kaspersky Lab’ experts investigated one such toolkit, dubbed KoffeyMaker, in 2017-2018, when a number of Eastern European banks turned to us for assistance after their ATMs were quickly and almost freely raided. It soon became clear that we were dealing with a black box attack.

    More...
    See more | Go to post

  • Kaspersky Security Bulletin 2018. Statistics

    Kaspersky Security Bulletin 2018. Statistics

    During the year, Kaspersky Lab solutions repelled 1 876 998 691 attacks launched from online resources located all over the world, 554 159 621 21 643 946 unique malicious objects were detected and unique URLs were recognized as malicious by web antivirus components.

    More...
    See more | Go to post
There are no articles in this category.
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • A Zebrocy Go Downloader
    willie
    The Sofacy subset we identify as “Zebrocy” continues to target Central Asian government related organizations, both in-country and remote locations, along with a new middle eastern diplomatic target. And, as predicted, they continue to build out their malware set with a variety of scripts and managed code.

    More...
    11-01-2019, 16:41
  • The world’s southernmost security conference
    willie
    In November I had the privilege of participating in a conference that can rightfully be labelled the world's southernmost. It is called "Patagonia Hacking" and it is organized in the Chilean city of Punta Arenas

    More...
    11-01-2019, 16:41
  • Remotely controlled EV home chargers – the threats and vulnerabilities
    willie
    There are lots of home charger vendors. Some of them, such as ABB or GE, are well-known brands, but some smaller companies have to add ‘bells and whistles’ to their products to attract customers. One of the most obvious and popular options in this respect is remote control of the charging process. But from our point of view this sort of improvement can make chargers an easy target for a variety of attacks.

    More...
    23-12-2018, 21:33
  • Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)
    willie
    In October 2018, our AEP systems detected an attempt to exploit a vulnerability in the Microsoft Windows. Further analysis led us to uncover a zero-day vulnerability in ntoskrnl.exe.

    More...
    23-12-2018, 21:33
  • DarkVishnya: Banks attacked through direct connection to local network
    willie
    In 2017-2018, Kaspersky Lab specialists were invited to research a series of cybertheft incidents. Each attack had a common springboard: an unknown device directly connected to the company’s local network.

    More...
    23-12-2018, 21:33
  • APT review of the year
    willie
    What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer. Still, with the benefit of hindsight, let’s try to approach the problem from different angles to get a better understanding of what went on.

    More...
    23-12-2018, 21:33
Working...
X