Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

SECURELIST

IT threat evolution in Q1 2022. Mobile statistics

27 May 2022

According to Kaspersky Security Network, in Q1 2022 516,617 mobile malware installation packages were detected, of which 53,947 packages …

Tags Adware, Fraud, Google Android, Malware reports

IT threat evolution Q1 2022

27 May 2022

Kaspersky IT threat review in Q1 2022: activity of APTs such as MoonBounce, BlueNororff, Lazarus and Roaming Mantis, attacks against …

Tags APT, Bluenoroff, Industrial threats, Malware reports

IT threat evolution in Q1 2022. Non-mobile statistics

27 May 2022

PC malware statistics for the Q1 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT …

Tags Apple MacOS, Financial malware, Internet of Things, Malware reports

Managed detection and response in 2021

26 May 2022

Kaspersky Managed Detection and Response (MDR) services in 2021 in facts and figures: number of security incidents detected, their …

Tags Industrial threats, Internal Threats Statistics, MDR, Publications

The Verizon 2022 DBIR

25 May 2022

The Verizon 2022 Data Breach Investigations Report is out, where Kaspersky collaborated as a contributor. The report provides interesting …

Tags APT, Botnets, Cyber Espionage, Publications

What’s wrong with automotive mobile apps?

25 May 2022

Third party automotive mobile apps, web apps and API clients provide drivers with additional functions but may pose security risks for …

Tags connected car, Data Protection, Internet of Things, Publications

ISaPWN – research on the security of ISaGRAF Runtime

23 May 2022

This report includes an analysis of the ISaGRAF framework, its architecture, the IXL and SNCP protocols and the description of several …

Tags Controllers, Encryption, Firmware, Research

Evaluation of cyber activities and the threat landscape in Ukraine

17 May 2022

With this article, our core aim is to share a threat landscape overview, which Kaspersky cybersecurity researchers are observing in …

Tags APT, Industrial Control Systems, Publications, Ransomware

HTML attachments in phishing e-mails

16 May 2022

In this article we review phishing HTML attachments, explaining common tricks the attackers use, and give statistics on HTML attachments …

Tags HTML, Phishing, Spam and phishing mail, Spam Letters

New ransomware trends in 2022

11 May 2022

This year, ransomware is no less active than before: cybercriminals continue to threaten nationwide retailers and enterprises, old variants …

Tags Cybercrime, Data Encryption, Malware Descriptions, Publications

Mobile subscription Trojans and their little tricks

6 May 2022

Kaspersky analysis of mobile subscription Trojans Joker (Jocker), MobOk, Vesub and GriftHorse and their activity: technical description and …

Tags Google Android, Malware, Malware Descriptions

A new secret stash for “fileless” malware

4 May 2022

We observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious …

Tags Digital Certificates, Fileless Malware, Malware Descriptions

APT trends report Q1 2022

27 April 2022

This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 …

Tags APT, APT reports, Chinese-speaking cybercrime, Fileless Malware

How to recover files encrypted by Yanluowang

25 April 2022

Kaspersky experts have found a vulnerability in the Yanluowang encryption algorithm and created a free decryptor to help victims of this …

Tags Cybercrime, Malware Descriptions, Malware Technologies, Ransomware
Post navigation
Older posts
Page1 Page2 … Page33 Next →
Cookie-Free

NVD

  • CVE-2022-28394 – EOL Product CVE – Installer of Trend Micro Password Manager (Consumer) versions 3.7.0.1223 …27 May 2022
  • CVE-2022-30687 – Trend Micro Maximum Security 2022 is vulnerable to a link following vulnerability that cou …27 May 2022
  • CVE-2022-30700 – An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a …27 May 2022
  • CVE-2022-30701 – An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as …27 May 2022
  • CVE-2022-1898 – Use After Free in GitHub repository vim/vim prior to 8.2. …27 May 2022
  • CVE-2022-1907 – Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. …27 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • IT threat evolution in Q1 2022. Mobile statistics27 May 2022
  • IT threat evolution Q1 202227 May 2022
  • IT threat evolution in Q1 2022. Non-mobile statistics27 May 2022
  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »