Quantcast
Channel: targeted attacks – Kaspersky official blog
Browsing all 22 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Testing the mettle: legit tools for illicit cyberespionage

Securelist has released a thoughtful – and somewhat pessimistic – report on cybercriminals using an open source security testing tool for browsers with malicious purposes. The browser exploitation...

View Article



Image may be NSFW.
Clik here to view.

Danti and Co: Beware of Long-Forgotten Vulnerabilities!

No need for sophistication At the end of 2015, Kaspersky Lab’s Global Research and Analysis Team (GReAT) made a series of predictions about changes to the threat landscape that are to be expected in...

View Article

Image may be NSFW.
Clik here to view.

xDedic, a platform for selling hacked credentials, serves as an attack...

Kaspersky Lab has been researching an active cybercriminal trading platform called xDedic lately. The main purpose of the xDedic marketplace is to facilitate the buying and selling of credentials from...

View Article

Image may be NSFW.
Clik here to view.

Advanced cyberthreats, demystified

A few years from now someone will start writing the history of advanced, highly sophisticated cyberthreats. This person will obviously start with Stuxnet, and go through the findings of campaigns like...

View Article

Image may be NSFW.
Clik here to view.

Operation Ghoul: Learning from the targeted attack analysis to protect your...

Today Kaspersky Lab’s security experts released a detailed report on Operation Ghoul – a targeted campaign aimed primarily at businesses in the Middle East, although a notable number of attacked...

View Article


Image may be NSFW.
Clik here to view.

Targeted attack mitigation: everything can go wrong

Targeted attacks on businesses vary in their level of sophistication, goals and points of entry into the corporate infrastructure, but they all have one thing in common – they are ridiculously hard to...

View Article

Image may be NSFW.
Clik here to view.

Kaspersky Lab answers the newest challenges

Epidemics, data leakage, and targeted attacks over the past few years have significantly changed attitudes toward cybersecurity. Nowadays, no one thinks protection against cyberthreats is just a system...

View Article

Image may be NSFW.
Clik here to view.

Financial fraud on an industrial scale

Our researchers have discovered another phishing campaign aimed at stealing money from corporate accounts. This time, the criminals primarily targeted manufacturing companies. Usually, attacks on such...

View Article


Image may be NSFW.
Clik here to view.

DarkVishnya attacks from inside

Normally, we start investigating a cyberincident by looking for a source of infection. The source is not difficult to find — we look for an e-mail with a malware attachment or a malicious link, or for...

View Article


Image may be NSFW.
Clik here to view.

Transatlantic Cable podcast, episode 69

For this special edition of the Kaspersky Lab Transatlantic Cable podcast, I sit down with Vicente Diaz, the deputy director for Europe on our Global Research and Analysis Team (GReAT), and discuss...

View Article

Image may be NSFW.
Clik here to view.

Chrome in the zero-day crosshairs

Thanks to the Kaspersky Exploit Prevention subsystem in our products, we recently detected an exploit — a malicious program letting attackers gain unauthorized access to the computer — through a...

View Article

Snow White, the Seven Cryptominers, and the targeted attacks

Children know how to ask uncomfortable questions. Does Santa Claus exist? Where does the tooth fairy take the teeth it collects? Is it even possible to track any person you want to? Is it true that...

View Article

MITRE ATT&CK evaluations

MITRE is not just a company that compares security solutions. It is a nonprofit organization whose mission is to create a safer world. Anyone at all familiar with the world of cybersecurity will be...

View Article


Can cybercriminals jump your air gap?

Internet equals troubles. That’s why one of the most radical ways to secure a computer storing extremely valuable information or controlling a critical process is never to connect it to the Internet,...

View Article

MATA: A multiplatform malware framework

The cybercriminal tool set is constantly evolving. The latest example: the malicious MATA framework our experts recently uncovered. Cybercriminals were using it to attack corporate infrastructures...

View Article


Lazarus experiments with new ransomware

The Lazarus group has always stood out for using methods typical of APT attacks but specializing in financial cybercrime. Recently, our experts detected fresh, previously unexplored VHD malware, which...

View Article

CD Projekt confirms ransomware attack on internal system | Kaspersky official...

CD Projekt has issued a statement, saying that unspecified ransomware attacked the company’s information systems. The company, known for game series The Witcher and the notorious Cyberpunk 2077 project...

View Article


Top 5 most dangerous ransomware in 2021 | Kaspersky official blog

Over the past five years, ransomware has evolved from being a threat to individual computers to posing a serious danger to corporate networks. Cybercriminals have stopped simply trying to infect as...

View Article

How secure is an isolated subnet? | Kaspersky official blog

Some infosec specialists believe isolated networks do not need additional protection; if threats have no way to get in, why bother? But isolation is not a guarantee of invulnerability. Our experts...

View Article

--- Article Not Found! ---

*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***

View Article
Browsing all 22 articles
Browse latest View live




Latest Images