Targeted Malware Reverse Engineering Workshop follow-up. Part 2

by Kaspersky
21 Apr 2021 at 10:00am
The Reverse Engineering webinar audience having been so active not only were we unable to address all the incoming questions online, we didn?t even manage to pack the rest of them in one blogpost. So here comes the second part of the webinar follow-up.

Targeted Malware Reverse Engineering Workshop follow-up. Part 1

by Kaspersky
19 Apr 2021 at 11:30am
With so many questions collected during the Targeted Malware Reverse Engineering webinar we lacked the time to answer them all online, we promised we would come up with this blogpost.

Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the...

by Boris Larin, Costin Raiu, Brian Bartholomew
13 Apr 2021 at 5:35pm
CVE-2021-28310 is an out-of-bounds (OOB) write vulnerability in dwmcore.dll, which is part of Desktop Window Manager (dwm.exe). We believe it is exploited in the wild, potentially by several threat actors.

Malicious code in APKPure app

by Igor Golovin, Anton Kivva
9 Apr 2021 at 4:58pm
Malicious code was detected in version 3.17.18 of the APKPure alternative app store for Android. We recommend deleting the infected version and installing APKPure 3.17.19 asap.

The leap of a Cycldek-related threat actor

by Ivan Kwiatkowski, Pierre Delcher, Mark Lechtik
5 Apr 2021 at 10:00am
The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Browser lockers: extortion disguised as a fine

by AMR
2 Apr 2021 at 10:00am
In this article we discuss browser lockers that mimic law enforcement websites.

Financial Cyberthreats in 2020

by Kaspersky
31 Mar 2021 at 2:00pm
This research is a continuation of our annual financial threat reports providing an overview of the latest trends and key events across the financial threat landscape. The study covers the common phishing threats, along with Windows and Android-based financial malware.

APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign

by GReAT
30 Mar 2021 at 10:00am
A41APT is a long-running campaign with activities detected from March 2019 to the end of December 2020. Most of the discovered malware families are fileless malware and they have not been seen before.

Doxing in the corporate sector

by Anna Larkina, Roman Dedenok
29 Mar 2021 at 10:00am
Organizations can become a target of doxing. Corporate doxing poses a serious financial and reputational threat to a company.

Threat landscape for industrial automation systems. Statistics for H2 2020

by Kaspersky ICS CERT
25 Mar 2021 at 10:00am
We continued our observations and identified a number of trends that could, in our opinion, be due to circumstances connected with the pandemic in one way or another, as well as the reaction of governments, organizations and people to these circumstances.

powered by dotcombinat


TOP Referrer

TOP Downloads

Mac OSX Widget



spam shirt

Partner Sites