Security News

  • The zero-day exploits of Operation WizardOpium


    Back in October 2019 we detected a classic watering-hole attack that exploited a chain of Google Chrome and Microsoft Windows zero-days. In this blog post we’d like to take a deep technical dive into the attack.
  • Spam and phishing in Q1 2020


    Glancing at the results of Q1 2020, we anticipate that the COVID-19 topic will continue to be actively used by cybercriminals for the foreseeable future. To attract potential victims, the pandemic will be mentioned even on "standard" fake pages and in spam mailings.
  • Aggressive in-app advertising in Android


    We will look into a few examples of suspicious-looking ad modules that we discovered in popular apps earlier this year.
  • IT threat evolution Q1 2020. Statistics


    Kaspersky solutions blocked 726,536,269 attacks launched from online resources across the globe, a total of 442,039,230 unique URLs were recognized as malicious.
  • IT threat evolution Q1 2020


    Operation AppleJeus, news about Roaming Mantis, watering-hole websites in Asia, virus blast from the past and other targeted attacks and malware campaigns.
  • Verizon’s 2020 DBIR


    Verizon’s 2020 DBIR is out, you can download a copy or peruse their publication online. Kaspersky was a contributor once again, and we are happy to provide generalized incident data from our unique and objective research.
  • Cyberthreats on lockdown


    The pandemic has affected us all in some way, so it would be surprising if cybercriminals were an exception. Spammers and phishers were naturally the trailblazers in this but the entire cybercrime landscape has changed in the last few months.
  • COMpfun authors spoof visa application with HTTP status-based Trojan


    In autumn 2019 we published a story about how a COMpfun successor known as Reductor infected files on the fly to compromise TLS traffic. Later in November 2019 we revealed a new Trojan using the same code base as COMPFun.
  • Naikon’s Aria


    Our colleagues at Checkpoint put together a fine research writeup on some Naikon resources and activity related to “aria-body” that we detected in 2017 and similarly reported in 2018.
  • DDoS attacks in Q1 2020


    Since the beginning of 2020, due to the COVID-2019 pandemic, life has shifted almost entirely to the Web. This is reflected in the goals of recent DDoS attacks, with the most targeted resources in Q1 being websites of medical organizations, delivery services, and gaming and educational platforms.

Leave a Reply

Your email address will not be published. Required fields are marked *