A little while back we were investigating the malicious activities of the Freakyshelly targeted attack and came across spear phishing emails that had some interesting documents attached to them. They were in OLE2 format and contained no macros, exploits or any other active content
As a part of our Kaspersky APT Intelligence Reporting subscription, customers received an update in mid-February 2017 on some interesting APT activity that we called WhiteBear. It is a parallel project or second stage of the Skipper Turla cluster of activity documented in another private report. Like previous Turla activity, WhiteBear leverages compromised websites and hijacked satellite connections for command and control (C2) infrastructure.
One good thing about having a lot of Facebook friends is that you simply act as a honey pot when your friends click on malicious things. A few days ago I got a message on Facebook from a person I very rarely speak to, and I knew that something fishy was going on.
The threat from ransomware continues to grow. Between April 2016 and March 2017, we blocked ransomware on the computers of 2,581,026 Kaspersky Lab customers. In May, we saw the biggest ransomware epidemic in history, called WannaCry.
At the end of 2016, there was a major attack against San Francisco’s Municipal Transportation Agency. The attack was done using Mamba ransomware.
A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules
Money remains the driving force of DDoS attacks.The growing interest in cryptocurrencies leads to an increase in their exchange-value in the second quarter of 2017.
Hidden motivations in separate but similar destructive events
Recently, there have been discussions around the topic that if our product is installed, ExPetr malware won’t write the special malicious code which encrypts the MFT to MBR.
How to gain visibility and control of data in cloud apps.
Microsoft Intune gives you a diverse set of tools for managing your complex mobile environment. Intune’s innovative combination of mobile application management and device management options gives you flexibility in how you manage and secure mobile productivity.
The golden age of Trojans and viruses has long gone.
While the (cyber-)world was still shaking under the destructive ExPetr/Petya attack that hit on June 27, another ransomware attack targeting Ukraine at the same time went almost unnoticed.
F-Secure blocks the new ransomware that spreads like May’s historic outbreak. However, this time the criminals appear to be pros.
Digital transformation has left a whole host of vulnerabilities attacking the workplace from all quarters. Leo Joseph, Senior Director of Enterprise Sales and Solutions, at HP India, gives us a glimpse at what’s at stake.
Siva Sivasubramanian of Bharti Airtel shared his insights into what makes the telecom sector a prime target for cyber criminals, and what the industry can do to fight back.
Charru Malhotra, Associate Professor of e-Governance and ICT at the Indian Institute of Public Administration, discusses the importance of bolstering security for the smart and digitally inclusive nation.
Cyber criminals are now cashing in on the widespread fear looming on the security landscape. There are a host of malware patches that are actually malwares in themselves.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.