Category: SECURELIST
-
Looking for sophisticated malware in IoT devices
Let’s talk about the structure of the firmware of an IoT device in order to get a better understanding of the different …
-
An overview of targeted attacks and APTs on Linux
Perhaps unsurprisingly, a lot has been written about targeted attacks on Windows systems. Windows is, due to its popularity, the platform …
-
Digital Education: The cyberrisks of the online classroom
This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around the world …
-
IT threat evolution Q2 2020. Mobile statistics
According to Kaspersky Security Network, during the second quarter 1,245,894 malicious installers were detected and a total of 14,204,345 …
-
IT threat evolution Q2 2020. PC statistics
During the second quarter Kaspersky solutions blocked 899,744,810 attacks launched from online resources across the globe, as many as …
-
IT threat evolution Q2 2020
Targeted attacks and APT groups, new malware and the COVID-19 pandemic exploitation in the second quarter of …
-
Operation PowerFall: CVE-2020-0986 and variants
While we already described the exploit for Internet Explorer in the original blog post about Operation PowerFall, we also promised to share …
-
Transparent Tribe: Evolution analysis,part 2
In the second article, we describe a new Android implant used by Transparent Tribe for spying on mobile devices and present new evidence …
-
Lifting the veil on DeathStalker, a mercenary triumvirate
DeathStalker is a unique threat group that appears to target law firms and companies in the financial sector. They don’t deploy …
-
Transparent Tribe: Evolution analysis,part 1
Transparent Tribe, also known as PROJECTM and MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as …
-
CactusPete APT group’s updated Bisonal backdoor
A new CactusPete campaign shows that the group’s favored types of target remain the same. The victims of the new variant of the Bisonal …
-
Internet Explorer and Windows zero-day exploits used in Operation PowerFall
Kaspersky prevented an attack on a South Korean company by a malicious script for Internet Explorer. Closer analysis revealed that the …
●●●