Kaspersky Security Bulletin 2018. Top security stories
Introduction The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The dependence on technology of governments, businesses and consumers provides a broad attack surface for attackers with all kinds of motives – financial theft, theft of […] more…IT threat evolution Q2 2018
Targeted attacks and malware campaigns Operation Parliament In April, we reported the workings of Operation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world – with its main focus in the MENA (Middle East and North Africa) region, especially Palestine. The attacks, which started early in 2017, target parliaments, […] more…Spam and phishing in Q2 2016
Download the full report (PDF) Spam: quarterly highlights The year of ransomware in spam Although the second quarter of 2016 has only just finished, it’s safe to say that this is already the year of ransomware Trojans. By the end of Q2 there was still a large number of emails with malicious attachments, most of […] more…More information
- ICS System with Public Exploits Cannot be Patched
- Computer security: Processor vulnerability can be exploited to access memory
- Microsoft Internet Explorer CVE-2014-6373 Remote Memory Corruption Vulnerability
- Facebook Adapts Defenses as Deception Campaigns Go Stealth
- 2020 outlook for cybersecurity legislation
- UK top 500 legal firm credentials leaked on the Dark Web
- OS Update for php.scripts.psu.edu and alerts.its.psu.edu
- Meet the High Schooler Shaking Up Artificial Intelligence
- Four Things You Should Know About Securing Your Growing Business
- Why knowing the location of your attacker is key in defending against DDoS