What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
SecureList.webp 2020-09-03 11:00:55 IT threat evolution Q2 2020. Mobile statistics (lien direct) According to Kaspersky Security Network, during the second quarter 1,245,894 malicious installers were detected and a total of 14,204,345 attacks on mobile devices were blocked. Threat ★★★★★
SecureList.webp 2020-09-03 10:00:20 IT threat evolution Q2 2020 (lien direct) Targeted attacks and APT groups, new malware and the COVID-19 pandemic exploitation in the second quarter of 2020 Malware Threat
SecureList.webp 2020-08-24 10:00:19 Lifting the veil on DeathStalker, a mercenary triumvirate (lien direct) DeathStalker is a unique threat group that appears to target law firms and companies in the financial sector. They don't deploy ransomware or steal payment information to resell it, their interest in gathering sensitive business information. Ransomware Threat
SecureList.webp 2020-07-29 10:00:09 APT trends report Q2 2020 (lien direct) This summary is based on our threat intelligence research and provides a representative snapshot of what we have published and discussed, focusing on activities that we observed during Q2 2020. Threat
SecureList.webp 2020-06-24 10:00:16 Magnitude exploit kit – evolution (lien direct) Exploit kits still play a role in today's threat landscape and continue to evolve. For this blogpost I studied and analyzed the evolution of one of the most sophisticated exploit kits out there – Magnitude EK – for a whole year. Threat
SecureList.webp 2020-06-23 10:00:08 Oh, what a boot-iful mornin\' (lien direct) In mid-April, our threat monitoring systems detected malicious files being distributed under the name "on the new initiative of the World Bank in connection with the coronavirus pandemic" (in Russian) with the extension EXE or RAR. Inside the files was the well-known Rovnix bootkit. Threat
SecureList.webp 2020-06-19 10:00:10 Microcin is here (lien direct) In February 2020, we observed a Trojan injected into the system process memory on a particular host. The target turned out to be a diplomatic entity. We attribute this campaign with high confidence to the SixLittleMonkeys (aka Microcin) threat actor. Threat
SecureList.webp 2020-06-09 10:00:37 Looking at Big Threats Using Code Similarity. Part 1 (lien direct) Today, we are announcing the release of KTAE, the Kaspersky Threat Attribution Engine. This code attribution technology, developed initially for internal use by the Kaspersky Global Research and Analysis Team, is now being made available to a wider audience. Threat
Last update at: 2024-07-17 21:08:29
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter