APT review: what the world’s threat actors got up to in 2019
What were the most interesting developments in terms of APT activity during the year and what can we learn from them? This is not an easy question to answer, because researchers have only partial visibility and it´s impossible to fully understand the motivation for some attacks or the developments behind them. However, let´s try to […] more…IT threat evolution Q3 2019
Targeted attacks and malware campaigns Mobile espionage targeting the Middle East At the end of June we reported the details of a highly targeted campaign that we dubbed ‘Operation ViceLeaker’ involving the spread of malicious Android samples via instant messaging. The campaign affected several dozen victims in Israel and Iran. We discovered this activity in […] more…IT threat evolution Q2 2018
Targeted attacks and malware campaigns Operation Parliament In April, we reported the workings of Operation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world – with its main focus in the MENA (Middle East and North Africa) region, especially Palestine. The attacks, which started early in 2017, target parliaments, […] more…Spam and phishing in Q2 2016
Download the full report (PDF) Spam: quarterly highlights The year of ransomware in spam Although the second quarter of 2016 has only just finished, it’s safe to say that this is already the year of ransomware Trojans. By the end of Q2 there was still a large number of emails with malicious attachments, most of […] more…Kaspersky Security Bulletin. Spam and phishing in 2015
Download PDF The year in figures According to Kaspersky Lab, in 2015 The proportion of spam in email flows was 55.28%, which is 11.48 percentage points lower than in 2014. 79% of spam emails were no more than 2 KB in size. 15.2% of spam was sent from the US. 146,692,256 instances that triggered the […] more…More information
- What *is* that creature I see before me? (Chet Chat Podcast 246)
- Build a Champion SOC with VirusTotal and Palo Alto Networks Cortex XSOAR
- Actor Targeting Middle East Shows Excellent OPSEC
- Privacy advocates plan to fight Congress’ repeal of ISP privacy rules
- Picky spyware ranks sensitive military documents
- Nearly 100 TCP/IP Stack Vulnerabilities Found During 18-Month Research Project
- Dell Command Configure CVE-2019-18575 Arbitrary File Overwrite Vulnerability
- Low-code development becoming business skill ‘table stakes’
- Microsoft Office WPD File CVE-2013-0082 Remote Memory Corruption Vulnerability
- MWC Preview: Tailoring Security to the Modern Connected Lifestyle