Ransomware Masquerading as Microsoft Update Targets Home Computers
A new ransomware threat is currently sweeping its way across home computers. And what’s making it extra tricky is that it’s disguised as an operating system update. Be on the lookout for this new ransomware scheme and protect yourself from ransomware with a few of these tips. What Is Magniber Ransomware? Magniber is a new type of […] more…Apple Hit by Same Java Exploit as Facebook in Largest-Ever Cyber Attack on Corporate Mac Computers
Add Apple to the list of high-profile companies hit by hackers as of late, right on the heels of a similar attack on Facebook just last week. According to Reuters, this is the widest known cyber attack to ever target corporate Apple computers. In other words: This is a big deal. For both Facebook and […] more…Russian-speaking cybercrime evolution: What changed from 2016 to 2021
Experts at Kaspersky have been investigating various computer incidents on a daily basis for over a decade. Having been in the field for so long, we have witnessed some major changes in the cybercrime world’s modus operandi. This report shares our insights into the Russian-speaking cybercrime world and the changes in how it operates that […] more…APT review: what the world’s threat actors got up to in 2019
What were the most interesting developments in terms of APT activity during the year and what can we learn from them? This is not an easy question to answer, because researchers have only partial visibility and it´s impossible to fully understand the motivation for some attacks or the developments behind them. However, let´s try to […] more…APT trends report Q2 2019
For two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They aim to […] more…McAfee Researchers Find Poor Security Exposes Medical Data to Cybercriminals
The nonperishable nature of medical data makes an irresistible target for cybercriminals. The art of hacking requires significant time and effort, encouraging experienced cybercriminals to plot their attacks based on the return they will see from their investment. Those who have successfully gained access to medical data have been well rewarded for their efforts. One […] more…Lurk: Retracing the Group’s Five-Year Campaign
by Fyodor Yarochkin and Vladimir Kropotov (Senior Threat Researchers) Fileless infections are exactly what their namesake says: they’re infections that don’t involve malicious files being downloaded or written to the system’s disk. While fileless infections are not necessarily new or rare, it presents a serious threat to enterprises and end users given its capability to […] more…Unmasking “Free” Premium WordPress Plugins
WordPress has a large repository of free plugins (currently 30,000+) that can add almost any functionality to your blog. However, there is still a market for premium plugins. Premium plugins are especially popular when they help blogs make money: eCommerce, SEO, affiliate and customer management, and so on. Such plugins may be really great and […] more…More information
- Online Activities Related to Elections in Malaysia
- Microsoft Internet Explorer CVE-2014-6368 ASLR Security Bypass Vulnerability
- Microsoft Windows CVE-2019-0840 Local Information Disclosure Vulnerability
- Real-Time Intelligence: Security Silver Bullet or Too Good to Be True?
- Why Uber wants to build scooters and bikes that can drive themselves
- Sextortion mail from yourself? It doesn’t mean you’ve been hacked…
- Slovak, Polish Parliaments Hit by Cyberattacks
- Update: PASS backups suspended
- Resolved: Integrated Business Information System (IBIS) Maintenance – July 23, 2014
- Minimum education requirements are needed for an IT security career