Testing the mettle: legit tools for illicit cyberespionage
Securelist has released a thoughtful – and somewhat pessimistic – report on cybercriminals using an open source security testing tool for browsers with malicious purposes. The browser exploitation...
View ArticleDanti and Co: Beware of Long-Forgotten Vulnerabilities!
No need for sophistication At the end of 2015, Kaspersky Lab’s Global Research and Analysis Team (GReAT) made a series of predictions about changes to the threat landscape that are to be expected in...
View ArticlexDedic, a platform for selling hacked credentials, serves as an attack...
Kaspersky Lab has been researching an active cybercriminal trading platform called xDedic lately. The main purpose of the xDedic marketplace is to facilitate the buying and selling of credentials from...
View ArticleAdvanced cyberthreats, demystified
A few years from now someone will start writing the history of advanced, highly sophisticated cyberthreats. This person will obviously start with Stuxnet, and go through the findings of campaigns like...
View ArticleOperation Ghoul: Learning from the targeted attack analysis to protect your...
Today Kaspersky Lab’s security experts released a detailed report on Operation Ghoul – a targeted campaign aimed primarily at businesses in the Middle East, although a notable number of attacked...
View ArticleTargeted attack mitigation: everything can go wrong
Targeted attacks on businesses vary in their level of sophistication, goals and points of entry into the corporate infrastructure, but they all have one thing in common – they are ridiculously hard to...
View ArticleKaspersky Lab answers the newest challenges
Epidemics, data leakage, and targeted attacks over the past few years have significantly changed attitudes toward cybersecurity. Nowadays, no one thinks protection against cyberthreats is just a system...
View ArticleFinancial fraud on an industrial scale
Our researchers have discovered another phishing campaign aimed at stealing money from corporate accounts. This time, the criminals primarily targeted manufacturing companies. Usually, attacks on such...
View ArticleDarkVishnya attacks from inside
Normally, we start investigating a cyberincident by looking for a source of infection. The source is not difficult to find — we look for an e-mail with a malware attachment or a malicious link, or for...
View ArticleTransatlantic Cable podcast, episode 69
For this special edition of the Kaspersky Lab Transatlantic Cable podcast, I sit down with Vicente Diaz, the deputy director for Europe on our Global Research and Analysis Team (GReAT), and discuss...
View ArticleChrome in the zero-day crosshairs
Thanks to the Kaspersky Exploit Prevention subsystem in our products, we recently detected an exploit — a malicious program letting attackers gain unauthorized access to the computer — through a...
View ArticleSnow White, the Seven Cryptominers, and the targeted attacks
Children know how to ask uncomfortable questions. Does Santa Claus exist? Where does the tooth fairy take the teeth it collects? Is it even possible to track any person you want to? Is it true that...
View ArticleMITRE ATT&CK evaluations
MITRE is not just a company that compares security solutions. It is a nonprofit organization whose mission is to create a safer world. Anyone at all familiar with the world of cybersecurity will be...
View ArticleCan cybercriminals jump your air gap?
Internet equals troubles. That’s why one of the most radical ways to secure a computer storing extremely valuable information or controlling a critical process is never to connect it to the Internet,...
View ArticleMATA: A multiplatform malware framework
The cybercriminal tool set is constantly evolving. The latest example: the malicious MATA framework our experts recently uncovered. Cybercriminals were using it to attack corporate infrastructures...
View ArticleLazarus experiments with new ransomware
The Lazarus group has always stood out for using methods typical of APT attacks but specializing in financial cybercrime. Recently, our experts detected fresh, previously unexplored VHD malware, which...
View ArticleCD Projekt confirms ransomware attack on internal system | Kaspersky official...
CD Projekt has issued a statement, saying that unspecified ransomware attacked the company’s information systems. The company, known for game series The Witcher and the notorious Cyberpunk 2077 project...
View ArticleTop 5 most dangerous ransomware in 2021 | Kaspersky official blog
Over the past five years, ransomware has evolved from being a threat to individual computers to posing a serious danger to corporate networks. Cybercriminals have stopped simply trying to infect as...
View ArticleHow secure is an isolated subnet? | Kaspersky official blog
Some infosec specialists believe isolated networks do not need additional protection; if threats have no way to get in, why bother? But isolation is not a guarantee of invulnerability. Our experts...
View Article--- Article Not Found! ---
*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***
View Article
More Pages to Explore .....