Spam and phishing in 2018
Numbers of the year The share of spam in mail traffic was 52.48%, which is 4.15 p.p. less than in 2017. The biggest source of spam this year was China (11.69%). 74.15% of spam emails were less than 2 KB in size. Malicious spam was detected most commonly with the Win32.CVE-2017-11882 verdict. The Anti-Phishing system […] more…Kaspersky Security Bulletin 2018. Top security stories
Introduction The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The dependence on technology of governments, businesses and consumers provides a broad attack surface for attackers with all kinds of motives – financial theft, theft of […] more…Spam and phishing in Q2 2018
Quarterly highlights GDPR as a phishing opportunity In the first quarter, we discussed spam designed to exploit GDPR (General Data Protection Regulation), which came into effect on May 25, 2018. Back then spam traffic was limited to invitations to participate in workshops and other educational events and purchase software or databases. We predicted that fraudulent […] more…IT threat evolution Q2 2018
Targeted attacks and malware campaigns Operation Parliament In April, we reported the workings of Operation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world – with its main focus in the MENA (Middle East and North Africa) region, especially Palestine. The attacks, which started early in 2017, target parliaments, […] more…Spam and phishing in Q2 2016
Download the full report (PDF) Spam: quarterly highlights The year of ransomware in spam Although the second quarter of 2016 has only just finished, it’s safe to say that this is already the year of ransomware Trojans. By the end of Q2 there was still a large number of emails with malicious attachments, most of […] more…More information
- Microsoft Edge CVE-2016-3386 Scripting Engine Remote Memory Corruption Vulnerability
- Cisco Cracks GozNym Trojan DGA, Sinkholes Botnet
- FBI arrests 74 in global Business Email Compromise takedown
- Silicon Valley is seriously worried about a cyber attack on Election Day
- Establishing Correspondence Between an Application and its Source Code
- The Mobile Cybercriminal Underground Market in China
- Check Point: ‘Unknown malware’ hits enterprise nets 53 times a day
- Brazil creates cyberattack response network
- Apple iOS Black Hat talk had bark, but no bite
- 92 Million User Credentials Exposed in MyHeritage Data Breach