Threat landscape for industrial automation systems. H1 2020 highlights

by Kaspersky Lab ICS CERT
24 Sep 2020 at 8:00am
Beginning in H2 2019 we have observed a tendency for decreases in the percentages of attacked computers, both in the ICS and in the corporate and personal environments. The internet, removable media and email continue to be the main sources of threats in the ICS environment.

Looking for sophisticated malware in IoT devices

by Noushin Shabab
23 Sep 2020 at 10:00am
Let?s talk about the structure of the firmware of an IoT device in order to get a better understanding of the different components.

An overview of targeted attacks and APTs on Linux

by GReAT
10 Sep 2020 at 10:00am
The Global Research and Analysis Team (GReAT) at Kaspersky publishes regular summaries of advanced persistent threat (APT) activity, based on the threat intelligence research discussed in greater detail in our private APT reports. In this report, we focus on the targeting of Linux resources by AP...

Digital Education: The cyberrisks of the online classroom

by Kaspersky
4 Sep 2020 at 10:00am
This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around the world were forced to close their doors. By April 29, 2020, more than 1.2 billion children across 186 countries? Read Full Article

IT threat evolution Q2 2020. Mobile statistics

by Victor Chebyshev
3 Sep 2020 at 11:00am
According to Kaspersky Security Network, during the second quarter 1,245,894 malicious installers were detected and a total of 14,204,345 attacks on mobile devices were blocked.

IT threat evolution Q2 2020. PC statistics

by Victor Chebyshev
3 Sep 2020 at 10:30am
During the second quarter Kaspersky solutions blocked 899,744,810 attacks launched from online resources across the globe, as many as 286,229,445 unique URLs triggered Web Anti-Virus components.

IT threat evolution Q2 2020

by David Emm
3 Sep 2020 at 10:00am
Targeted attacks and APT groups, new malware and the COVID-19 pandemic exploitation in the second quarter of 2020

Operation PowerFall: CVE-2020-0986 and variants

by Boris Larin
2 Sep 2020 at 10:00am
While we already described the exploit for Internet Explorer in the original blog post about Operation PowerFall, we also promised to share more details about the elevation of privilege exploit. Let?s take a look at vulnerability CVE-2020-0986.

Transparent Tribe: Evolution analysis, part 2

by Giampaolo Dedola
26 Aug 2020 at 10:00am
In the second article, we describe a new Android implant used by Transparent Tribe for spying on mobile devices and present new evidence confirms a link between ObliqueRAT and Transparent Tribe.

Lifting the veil on DeathStalker, a mercenary triumvirate

by Ivan Kwiatkowski
24 Aug 2020 at 10:00am
DeathStalker is a unique threat group that appears to target law firms and companies in the financial sector. They don?t deploy ransomware or steal payment information to resell it, their interest in gathering sensitive business information.

powered by dotcombinat


TOP Referrer

TOP Downloads

Mac OSX Widget



spam shirt

Partner Sites