In Review: 2016’s Mobile Threat Landscape Brings Diversity, Scale, and Scope
65 million: the number of times we’ve blocked mobile threats in 2016. By December 2016, the total number of unique samples of malicious Android apps we’ve collected and analyzed hit the 19.2 million mark—a huge leap from the 10.7 million samples collected in 2015. Indeed, the ubiquity of mobile devices among individual users and organizations, […] more…Kaspersky Security Bulletin 2016. The ransomware revolution
Download the PDF Introduction In 2016, ransomware continued its rampage across the world, tightening its hold on data and devices, and on individuals and businesses. The numbers speak for themselves: 62 new ransomware families made their appearance. There was an 11-fold increase in the number of ransomware modifications: from 2,900 new modifications in January/March, to […] more…Kaspersky Security Bulletin 2016. Story of the year
Download the PDF Introduction In 2016, ransomware continued its rampage across the world, tightening its hold on data and devices, and on individuals and businesses. The numbers speak for themselves: 62 new ransomware families made their appearance. There was an 11-fold increase in the number of ransomware modifications: from 2,900 new modifications in January/March, to […] more…Spam and phishing in Q3 2016
Download the full report (PDF) Spam: quarterly highlights Malicious spam Throughout 2016 we have registered a huge amount of spam with malicious attachments; in the third quarter, this figure once again increased significantly. According to KSN data, in Q3 2016 the number of email antivirus detections totaled 73,066,751. Most malicious attachments contained Trojan downloaders that […] more…Kaspersky DDOS intelligence report for Q3 2016
Q3 events Cybercrime as a Service In the last few months the scale of the global ‘Cybercrime as a Service’ infrastructure has been revealed – fully commercialized, with DDoS as one of the most popular services capable of launching attacks the likes of which have never seen before in terms of volume and technological complexity. […] more…Spam and phishing in Q2 2016
Download the full report (PDF) Spam: quarterly highlights The year of ransomware in spam Although the second quarter of 2016 has only just finished, it’s safe to say that this is already the year of ransomware Trojans. By the end of Q2 there was still a large number of emails with malicious attachments, most of […] more…IT threat evolution in Q2 2016. Statistics
Download the full report (PDF) All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from KSN users who agreed to provide it. Millions of Kaspersky Lab product users from 213 countries and territories worldwide participate […] more…IT threat evolution in Q2 2016. Overview
Download the full report (PDF) Targeted attacks and malware campaigns Cha-ching! Skimming off the cream Earlier in the year, as part of an incident response investigation, we uncovered a new version of the Skimer ATM malware. The malware, which first surfaced in 2009, has been re-designed. So too have the tactics of the cybercriminals using […] more…Kaspersky DDoS Intelligence Report for Q2 2016
Q2 events DDoS attacks on cryptocurrency wallet services have played an important role in the lives of these services. In the second quarter of 2016, two companies – CoinWallet and Coinkite – announced they were terminating their work due to lengthy DDoS attacks. According to Coinkite’s official blog, the e-wallet service will be shut down, […] more…French Dark Bets: Betting On Euro 2016
Like many countries, France has its own cybercriminal underground marketplaces and forums. Almost all of France’s murky websites are hosted in the Deep Web, specifically in what we call the “Dark Web”—that part of Internet most people never visit or hear about. It relies on darknets or networks where connections are made between trusted peers. Examples of […] more…KSN Report: Mobile ransomware in 2014-2016
Part 1. KSN Report: PC ransomware in 2014-2016 Download PDF version Statistics The activity of mobile ransomware, although not as widely covered in the media as PC ransomware, also skyrocketed over the period covered by this report. Especially in the second half. Fig. 12: The number of users encountering mobile ransomware at least once in […] more…IT threats during the 2016 Olympic Games in Brazil
Olympic threats designed to trick you Are you planning to visit Brazil during the Olympic Games? Or watch it online? In this blog post we discuss the threats to visitors aiming to travel to Brazil to watch the games and to those planning to watch it online. In the first part we’ll talk about phishing […] more…Spam and phishing in Q1 2016
Spam: features of the quarter Trending: dramatic increase in volume of malicious spam The first quarter of 2016 saw a dramatic increase in the number of unsolicited emails containing malicious attachments. Over the last two years the number of email antivirus detections on computers with a Kaspersky Lab product installed fluctuated between 3 and 6 […] more…IT threat evolution in Q1 2016
Download PDF version Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 228,420,754 malicious attacks from online resources located in 195 countries all over the world. 74,001,808 unique URLs were recognized as malicious by web antivirus components. Kaspersky Lab’s web antivirus detected 18,610,281 unique malicious objects: scripts, exploits, executable files, etc. There […] more…Kaspersky DDoS Intelligence Report for Q1 2016
Q1 events We have selected the events from the first quarter of 2016 that, in our view, illustrate the main trends in the field of DDoS attacks and the tools used to perform them. A record-breaking reflection DDoS attack DDoS attacks using amplification/reflection techniques are still popular and allow cybercriminals to break their peak power […] more…A Look Into Adobe Flash Player CVE-2016-1019 Zero-Day Vulnerability
By Jack Tang and Stanley Liu Adobe has just released a security update for Adobe Flash to address a vulnerability (CVE-2016-1019) that was used in zero day attacks against older versions of Adobe Flash. We previously discussed one such attack when we discovered this vulnerability being integrated in Magnitude Exploit Kit. In this post, we took a look […] more…More information
- The Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore
- Fortinet Enhances Network Security OS, Adds AI-based Threat Detection
- Apple Working on Patch for New Year’s Eve macOS Flaw
- In Hacker Highschool, students learn to redesign the future
- Help wanted: someone to hack cars for Canada defense research arm
- New Wave of SocGholish Infections Impersonates WordPress Plugins
- Advisory: BlueBorne Reportedly Affects Billions of Bluetooth-Enabled Devices
- 8 things Microsoft needs to do to save Windows 8
- China to probe Micron over cybersecurity, in chip war’s latest battle
- 000webhost DNS Hijacking Vulnerablity – Thousends of Websites including .gov domains Can be Hacked