IT threat evolution Q1 2020
Targeted attacks and malware campaigns Operation AppleJeus: the sequel In 2018, we published a report on Operation AppleJeus, one of the more notable campaigns of the threat actor Lazarus, currently one of the most active and prolific APT groups. One notable feature of this campaign was that it marked the first time Lazarus had targeted […] more…IT threat evolution Q2 2018
Targeted attacks and malware campaigns Operation Parliament In April, we reported the workings of Operation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world – with its main focus in the MENA (Middle East and North Africa) region, especially Palestine. The attacks, which started early in 2017, target parliaments, […] more…2018 Fraud World Cup
There are only two weeks to go before the start of the massive soccer event — FIFA World Cup. This championship has already attracted the attention of millions worldwide, including a fair few cybercriminals. Long before kick-off, email accounts began bulging with soccer-related spam, and scammers started exploiting the topic in mailings and creating World […] more…Energetic Bear/Crouching Yeti: attacks on servers
Energetic Bear/Crouching Yeti is a widely known APT group active since at least 2010. The group tends to attack different companies with a strong focus on the energy and industrial sectors. Companies attacked by Energetic Bear/Crouching Yeti are geographically distributed worldwide with a more obvious concentration in Europe and the US. In 2016-2017, the number […] more…Spam and phishing in 2016
The year in figures According to Kaspersky Lab, in 2016: The proportion of spam in email flows was 58.31%, which is 3.03 percentage points more than in 2015. 62.16% of spam emails were no more than 2 KB in size. 12.08% of spam was sent from the US. Trojan.Win32.Bayrob was the most popular malware family […] more…DDoS attacks in Q4 2016
News Overview Without doubt, 2016 was the year of Distributed Denial of Service (DDoS) with major disruptions in terms of technology, attack scale and impact on our daily life. In fact, the year ended with massive DDoS attacks unseen before, leveraging Mirai botnet technology, whose first appearance was covered in our last DDoS Intelligence Report. […] more…Smart Apps to Keep Your Teen from Texting and Driving
If you are like most parents, the “no texting and driving” comment is a daily exchange before your teen heads out the door, car keys in hand. A 2012 U.S. National Highway Traffic Safety Administration (NHTSA) survey found that drivers 18 to 20 showed the highest level of mobile phone involvement in crashes or near-crashes. […] more…More information
- Microsoft fixes 55 vulnerabilities, 3 exploited by Russian cyberspies
- Hackers Steal Swiss University Salaries
- Google Launches Android Hacking Contest
- That online job candidate may be carrying a virus
- Military ‘revenge porn’ investigation leads to 21 felony cases
- Coinye West: A new cryptocurrency for the masses and an ode to Kanye
- Preview: SecurityWeek’ 2018 ICS Cyber Security Conference – Oct. 22-25
- Dangerous SIM-swap lockscreen bypass – update Android now!
- Interpol Warns of ‘Alarming’ Cybercrime Rate During Pandemic
- Citrix Patches Critical Vulnerability in ADC, Gateway