IT threat evolution Q1 2020- Tempemail – Blog -Tempemail

Targeted attacks and malware campaigns Operation AppleJeus: the sequel In 2018, we published a report on Operation AppleJeus, one of the more notable campaigns of the threat actor Lazarus, currently...

IT threat evolution Q1 2020. Statistics- Tempemail – Blog -Tempemail

These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, Kaspersky solutions blocked 726,536,269...

Verizon’s 2020 DBIR | Securelist- Tempemail – Blog -Tempemail

Verizon’s 2020 DBIR is out, you can download a copy or peruse their publication online. Kaspersky was a contributor once again, and we are happy to provide generalized incident data...

Cyberthreats on lockdown | Securelist- Tempemail – Blog -Tempemail

Every year, our anti-malware research team releases a series of reports on various cyberthreats: financial malware, web attacks, exploits, etc. As we monitor the increase, or decrease, in the number...

COMpfun authors spoof visa application with HTTP status-based Trojan- Tempemail – Blog -Tempemail

You may remember that in autumn 2019 we published a story about how a COMpfun successor known as Reductor infected files on the fly to compromise TLS traffic. If you’re...

Naikon’s Aria | Securelist- Tempemail – Blog -Tempemail

Our colleagues at Checkpoint put together a fine research writeup on some Naikon resources and activity related to “aria-body” that we detected in 2017 and similarly reported in 2018. To...

APT trends report Q1 2020- Tempemail – Blog -Tempemail

For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on...

Remote spring: the rise of RDP bruteforce attacks- Tempemail – Blog -Tempemail

With the spread of COVID-19, organizations worldwide have introduced remote working, which is having a direct impact on cybersecurity and the threat landscape. Alongside the higher volume of corporate traffic,...
Close