BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents

Late last year, a wave of cyber-attacks hit several critical sectors in Ukraine. Widely discussed in the media, the attacks took advantage of known BlackEnergy Trojans as well as several new...

BASHLITE Family Of Malware Infects 1 Million IoT Devices

Over 1 million consumer web-connected video cameras and DVRs have have become the slaves to botnet herders that use the devices for DDoS and phishing attacks. Source: Threadpost

Spam and phishing in Q1 2016

Spam: features of the quarter Trending: dramatic increase in volume of malicious spam The first quarter of 2016 saw a dramatic increase in the number of unsolicited emails containing malicious attachments. Over the...

Kaspersky Security Bulletin. Spam and phishing in 2015

The year in figures According to Kaspersky Lab, in 2015 The proportion of spam in email flows was 55.28%, which is 11.48 percentage points lower than in 2014. 79% of spam emails were no...

Zero-day vulnerability in Telegram

In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when...

Brainteasers – August 26, 2014.

In July, KL turned 17! The occasion was marked in typical fanfare style, and gave us the chance to see in the last full year of our adolescence – by playing...

OPC UA security analysis

This paper discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. In publishing this material, we hope to draw the attention of vendors that develop...

Future attack scenarios against ATM authentication systems

A lot has already been said about current cyber threats facing the owners of ATMs. The reason behind the ever-growing number of attacks on these devices is simple: the overall level...

Threat intelligence report for the telecommunications industry

 Download PDF Introduction The telecommunications industry keeps the world connected. Telecoms providers build, operate and manage the complex network infrastructures used for voice and data transmission – and they communicate and store vast...

Adult Website Hack Exposes 1.2M ‘Wife Lover’ Fans

A 40-year-old, easily cracked encryption method was used to protect the 98MB database of user information. Source: Threadpost
- Advertisement -

APLICATIONS

On the trail of the XMRig miner

As protection methods improve, the developers of miners have had to enhance their own creations, often turning to non-trivial solutions. Several such solutions (previously...