Roaming Mantis dabbles in mining and phishing multilingually
...Malicious apks: 03108e7f426416b0eaca9132f082d568 07eab01094567c6d62a73f7098634eb8 NEW 1cc88a79424091121a83d58b6886ea7a 2a1da7e17edaefc0468dbf25a0f60390 31e61e52d38f19cf3958df2239fba1a7 34efc3ebf51a6511c0d12cce7592db73 4d9a7e425f8c8b02d598ef0a0a776a58 531714703557a58584a102ecc34162ff NEW 904b4d615c05952bcf58f35acadee5c1 9f94c34aae5c7d50bc0997d043df032b NEW a21322b2416fce17a1877542d16929d5 b84b0d5f128a8e0621733a6f3b412e19 bd90279ad5c5a813bc34c06093665e55 cc1e4d3af5698feb36878df0233ab14a NEW ff163a92f2622f2b8330a5730d3d636c 808b186ddfa5e62ee882d5bdb94cc6e2 ee0718c18b2e9f941b5d0327a27fbda1 NEW classes.dex: 13c8dda30b866e84163f82b95008790a NEW 19e3daf40460aea22962d98de4bc32d2 1b984d8cb76297efa911a3c49805432e NEW... more…Kaspersky Security Bulletin 2018. Top security stories
...actor’s activity is much broader. In October, we reported on the Turla group’s recent activities, revealing an interesting mix of old code, new code, and new speculations as to where... more…APT review of the year
...year. It also started using a new framework that we call Phoenix, as well as (unsurprisingly) transitioning to scripting and open source tools for its lateral movement stage. Finally, some... more…IT threat evolution in Q1 2016
...business to develop further. However, at the beginning of 2016 new Hacking Team implants for OSX were found. This indicates that the group has no intention of halting its work... more…APT Trends Report Q2 2018
...reports or request more information on a specific report are encouraged to contact: intelreports@kaspersky.com. Remarkable new findings We are always interested in analyzing new techniques used by existing groups, or... more…Attack on Zygote: a new twist in the evolution of mobile threats
...products The owners of the Trojans described above, such as Leech, Ztorg, Gorpo (as well as the new malware family Trojan.AndroidOS.Iop) are working together. Devices infected by these malicious programs... more…Windows 10: What’s New in the Security System
...Operating system security is one of Microsoft’s priorities. The developers of the new generation of Windows have vigorously responded to the most significant and relevant threats that target... more…A New Standard for Security at New Standard Corporation
...From the latches on the toolbox in your garage to componentry in gigantic earth movers, New Standard Corporation provides Original Equipment Manufacturer components, assemblies, and related services for... more…A New McAfee, A New Posture: Staying Agile While Still Going Big
...Our culture has an edge to it. We’re not afraid to try new things. As of right now, we’re “the new McAfee” too. Put all of that together and... more…Mobile malware evolution 2015
...The year in figures In 2015, Kaspersky Lab detected the following: 2,961,727 malicious installation packages 884,774 new malicious mobile programs – a threefold increase from the previous year... more…A New Security Age Needs a New Approach to Security
...computers and websites to newly internet-connected devices like refrigerators. But with these new devices comes new challenges – and new security strategy must emerge as a result. At first, consumers... more…New WannaCry-Mimicking SLocker Abuses QQ Services
...encrypts files Despite appearing more advanced with its new additional routines, this variant actually uses a less sophisticated encryption process. While its predecessor used HTTP, TOR or XMPP to communicate... more…New Andariel Reconnaissance Tactics Hint At Next Targets
...Andariel group attacked. During analysis, we noticed that the new injected script was trying to detect two additional ActiveX objects that were not on the previous list. One is “DSDOWNCTRL.DSDownCtrlCtrl.1”,... more…PlugX: New Tool For a Not So New Campaign
...Malware Blog – by Trend Micro PlugX: New Tool For a Not So New Campaign Read more: PlugX: New Tool For a Not So New Campaign Incoming search terms Xvibos... more…Same Old yet Brand-new: New File Types Emerge in Malware Spam Attachments
....XLSX, .EXE, and .HTML. But cybercriminals are expanding the file types they abuse. The following details how cybercriminals make use of old file types in brand-new ways, proving that they... more…CVE-2015-2545: overview of current threats
...xor operations and passes the execution to the result buffer. “update.dat”, a backdoor: Makes its first GET request to hardcoded CnC “newsupdate.dynssl.com/index.html” in order to get the new CnC in... more…Kam dál?
- Securitas acquires Diebold US e-security business in $350 million deal
- BlackBerry 10 is FIPS certified in advance of platform’s release
- ScholarSphere service interruption, 06/15/2016
- Update: TSM
- Preventing and Mitigating Ransomware with Cyber Situational Awareness
- Researchers Poison Machine Learning Engines
- Resist Phishing Attacks with Three Golden Rules
- Cisco Patches Critical Flaws in WebEx, UCS Director
- Microsoft SharePoint Server CVE-2017-11775 Cross Site Scripting Vulnerability
- 5 Romanian ransomware distributors arrested after police raid