Evaluation of cyber activities and the threat landscape in Ukraine

by GReAT
17 May 2022 at 2:00pm
With this article, our core aim is to share a threat landscape overview, which Kaspersky cybersecurity researchers are observing in relation to the conflict, with the wider international community and thus to contribute to broader ongoing cyber-stability discussions of threat-related insights.

HTML attachments in phishing e-mails

by Roman Dedenok
16 May 2022 at 8:00am
In this article we review phishing HTML attachments, explaining common tricks the attackers use, and give statistics on HTML attachments detected by Kaspersky solutions.

New ransomware trends in 2022

by GReAT
11 May 2022 at 12:00pm
This year, ransomware is no less active than before: cybercriminals continue to threaten nationwide retailers and enterprises, old variants of malware return while the new ones develop.

Mobile subscription Trojans and their little tricks

by Igor Golovin
6 May 2022 at 10:00am
Kaspersky analysis of mobile subscription Trojans Joker (Jocker), MobOk, Vesub and GriftHorse and their activity: technical description and statistics.

A new secret stash for ?fileless? malware

by Denis Legezo
4 May 2022 at 10:00am
We observed the technique of putting the shellcode into Windows event logs for the first time ?in the wild? during the malicious campaign. It allows the ?fileless? last stage Trojan to be hidden from plain sight in the file system.

APT trends report Q1 2022

by GReAT
27 Apr 2022 at 10:00am
This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 2022.

DDoS attacks in Q1 2022

by Alexander Gutnikov, Oleg Kupreev, Yaroslav Shmelev
25 Apr 2022 at 10:00am
Against the backdrop of the conflict between Russia and Ukraine, the number of DDoS attacks in Q1 2022 increased by 4.5 times against Q1 2021. A significant proportion of them were by hacktivists.

How to recover files encrypted by Yanluowang

by Marc Rivero, Yanis Zinchenko
18 Apr 2022 at 10:00am
Kaspersky experts have found a vulnerability in the Yanluowang encryption algorithm and created a free decryptor to help victims of this ransomware with recovering their files.

Emotet modules and recent attacks

by AMR
13 Apr 2022 at 10:00am
Emotet was disrupted in January 2021 and returned in November. This report provides technical description of its active modules and statistics on the malware's recent attacks.

The State of Stalkerware in 2021

by Kaspersky
12 Apr 2022 at 9:00am
Every year Kaspersky analyzes the use of stalkerware around the world to better understand the threat it poses. We partner with stakeholders across public and private sectors to raise awareness and find solutions to best tackle this important issue.

powered by dotcombinat


TOP Referrer

TOP Downloads

Mac OSX Widget



spam shirt

Partner Sites