IT threat evolution Q1 2021
Targeted attacks Putting the ‘A’ into APT In December, SolarWinds, a well-known IT managed services provider, fell victim to a sophisticated supply-chain attack. The company’s Orion IT, a solution for monitoring and managing customers’ IT infrastructure, was compromised by threat actors. This resulted in the deployment of a custom backdoor, named Sunburst, on the networks […] more…Stay Ahead of Misinformation – 5 Ways to Combat Fake News
Stay ahead of misinformation – 5 ways to combat fake news Finding information in this increasingly digital world has never been easier. Our mobile phones dictate top headlines before we even get out of bed, and even our routers can perform complex searches via voice. We see the impact of this easy access on both our consumption and the sharing of information. Just as it’s easy for us to perform a quick search and send the relevant results to our social groups, it’s also simple for bad actors to create and […] more…Mobile malware evolution 2015
The year in figures In 2015, Kaspersky Lab detected the following: 2,961,727 malicious installation packages 884,774 new malicious mobile programs – a threefold increase from the previous year 7,030 mobile banking Trojans Trends of the year Rise in the number of malicious attachments the user is unable to delete. Cybercriminals actively using phishing windows to […] more…More information
- The Evolution of Intelligence in 2017
- Windows 8 security: What’s new
- Cyberattackers botch integration of Adobe Flash zero-day vulnerability in exploit kits
- Was ist Karma? Bedeutung einfach erklärt.
- PHP patches actively exploited CGI vulnerability
- Passwords, patches and backup – three easy tips in our Facebook Live video
- Library service interruption, January 9, 2013
- Cisco Improperly Patched Exploited Router Vulnerabilities
- Meet the three North Korean hacking groups funding the country’s weapons programs
- EU data protection vote delayed again