A little while back we were investigating the malicious activities of the Freakyshelly targeted attack and came across spear phishing emails that had some interesting documents attached to them. They were in OLE2 format and contained no macros, exploits or any other active content
Over the last month alone, we have detected several large botnets designed to profit from concealed crypto mining. We have also observed growing numbers of attempts to install miners on servers owned by organizations. When these attempts are successful, the companies’ business processes suffer because data processing speeds fall substantially.
Sесurе Sосkеt Layer (SSl certificate or HTTPS) сеrtіfісаtеѕ wеrе designed and dеvеlореd bу Netscape tо сrеаtе a ѕесurе tunnel whеn transferring ѕеnѕіtіvе data between site uѕеrѕ and wеb hоѕtѕ.
The cyber security is always evolving and you, as a business or as a consumer, need to be ready to adapt to the new technologies, regulations and strategies that will help to develop a safer and more secure internet.
Website Security is a must for your Mobiles and tablets as our phones are not just phones anymore. That ‘phone’ that you use to stay in touch with people is actually a little computer containing valuable information about you, your family, your friends.
The Facebook malware that spread last week was dissected in a collaboration with Kaspersky Lab and Detectify. We were able to get help from the involved companies and cloud services to quickly shut down parts of the attack to mitigate it as fast as possible.
Corporate information security services often turn out to be unprepared: their employees underestimate the speed, secrecy and efficiency of modern cyberattacks and do not recognize how ineffective the old approaches to security are.
Make sure your team can outrace the next cyber threat, with a threat detection and response solution that delivers the insights they need to see threats coming sooner and drive them off faster.
With mobile, cloud and the internet of things creating new openings for cyber threats, your organization is at greater risk than ever. So you need more visibility than ever to detect threats and respond to them effectively.
Find out how enterprise can prepare for next-gen cyber attack with adequate integrated safeguards.
Kaspersky Lab analysts managed to detect a malicious program for Windows that was apparently created by the same group responsible for SambaCry.
The threat actor behind Spring Dragon APT has been developing and updating its range of tools throughout the years it has been operational.
At the end of 2016, there was a major attack against San Francisco’s Municipal Transportation Agency. The attack was done using Mamba ransomware.
A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules
Hidden motivations in separate but similar destructive events
Recently, there have been discussions around the topic that if our product is installed, ExPetr malware won’t write the special malicious code which encrypts the MFT to MBR.
How to gain visibility and control of data in cloud apps.