BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents
Late last year, a wave of cyber-attacks hit several critical sectors in Ukraine. Widely discussed in the media, the attacks took advantage of known BlackEnergy Trojans as well as several new...
BASHLITE Family Of Malware Infects 1 Million IoT Devices
Over 1 million consumer web-connected video cameras and DVRs have have become the slaves to botnet herders that use the devices for DDoS and phishing attacks.
Source: Threadpost
Spam and phishing in Q1 2016
Spam: features of the quarter
Trending: dramatic increase in volume of malicious spam
The first quarter of 2016 saw a dramatic increase in the number of unsolicited emails containing malicious attachments. Over the...
Kaspersky Security Bulletin. Spam and phishing in 2015
The year in figures
According to Kaspersky Lab, in 2015
The proportion of spam in email flows was 55.28%, which is 11.48 percentage points lower than in 2014.
79% of spam emails were no...
Zero-day vulnerability in Telegram
In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves the use of a classic right-to-left override attack when...
Brainteasers – August 26, 2014.
In July, KL turned 17! The occasion was marked in typical fanfare style, and gave us the chance to see in the last full year of our adolescence – by playing...
OPC UA security analysis
This paper discusses our project that involved searching for vulnerabilities in implementations of the OPC UA protocol. In publishing this material, we hope to draw the attention of vendors that develop...
Future attack scenarios against ATM authentication systems
A lot has already been said about current cyber threats facing the owners of ATMs. The reason behind the ever-growing number of attacks on these devices is simple: the overall level...
Threat intelligence report for the telecommunications industry
Download PDF
Introduction
The telecommunications industry keeps the world connected. Telecoms providers build, operate and manage the complex network infrastructures used for voice and data transmission – and they communicate and store vast...
Adult Website Hack Exposes 1.2M ‘Wife Lover’ Fans
A 40-year-old, easily cracked encryption method was used to protect the 98MB database of user information.
Source: Threadpost