27 Feb 2020 at 2:00pm
Kaspersky has continued to track the Roaming Mantis campaign. The group?s attack methods have improved and new targets continuously added in order to steal more funds.
25 Feb 2020 at 10:00am
In 2019, Kaspersky mobile products and technologies detected 3,503,952 malicious installation packages, 69,777 new mobile banking Trojans and 68,362 new mobile ransomware Trojans.
20 Feb 2020 at 11:03am
It is about two and half years since we first open-sourced a tool for remote digital forensics called Bitscout. Today, I am happy to announce that we are releasing a new version of Bitscout, based on the upcoming release of Ubuntu 20.04, scheduled for April 2020.
18 Feb 2020 at 10:00am
We discovered what appears to be one of AZORult's most unusual campaigns: abusing the ProtonVPN service and dropping malware via fake ProtonVPN installers for Windows.
13 Feb 2020 at 10:15am
In the last quarter of the year, the number of both attacks and C&C servers fell sharply, while the number of extra-long attacks (over 400 hours) was the highest ever recorded in the history of our observations.
10 Feb 2020 at 2:00pm
We recently discovered malware that spread through injecting malicious code into Windows executable files; in other words, a virus. It is the first ?living? virus in recent years that we have spotted in the wild. We named it KBOT.
7 Feb 2020 at 10:01am
Shortly before Christmas and New Year scammers send themed spam, and offer fake sales, promotions, and payouts.
23 Jan 2020 at 10:00am
For close to two years now, the Shlayer Trojan has been the most common threat on the macOS platform: in 2019, one in ten of our Mac security solutions encountered this malware at least once.
9 Jan 2020 at 10:00am
Cybercriminals use Trojan-Dropper.AndroidOS.Shopper.a to boost certain app?s rating and increase the number of installations and registrations. All this can be used, among other things, to dupe advertisers.
8 Jan 2020 at 10:00am
To attack macOS users, the Lazarus group has developed homemade macOS malware, and added an authentication mechanism to deliver the next stage payload very carefully, as well as loading the next-stage payload without touching the disk.