Ransomware by the numbers: Reassessing the threat’s global impact
Kaspersky has been following the ransomware landscape for years. In the past, we’ve published yearly reports on the subject: PC ransomware in 2014-2016, Ransomware in 2016-2017, and Ransomware and malicious crypto miners in 2016-2018. In fact, in 2019, we chose ransomware as the story of the year, upon noticing the well-known threat was shifting its […] more…Mirai, BrickerBot, Hajime Attack a Common IoT Weakness
We know that devices in the Internet of Things make enticing targets for attack. They are often insecure and can act as open windows into trusted networks. Cybercriminals are capitalizing on that more and more each day, gathering hundreds of thousands of insecure IoT devices into giant botnets. Remember what happened last fall when Mirai […] more…Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors
Nothing in life is free, and that’s especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace—most are legitimate and available at no initial cost. But they often come at the price of offering up data from your smartphone or tablet that you might not be aware of or […] more…SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
MSSPs took the lead in cybersecurity M&A in 2022 with twice as many deals as in 2021 An analysis conducted by SecurityWeek shows that more than 450 cybersecurity-related mergers and acquisitions were announced in 2022. In 2022, we tracked a total of 455 deals, compared to 435 in 2021. The US and UK continue to […] more…Is malware abusing your infrastructure? Find out with VirusTotal!
Any organization’s infrastructure might inadvertently be abused by attackers as part of a malicious campaign. It is therefore important to monitor any suspicious activity. VirusTotal can help you identify these threats and improve your threat detection and protection capabilities. In this post we will first analyze different available search modifiers and then we will provide […] more…US Government Agencies Warn of Malicious Use of Remote Management Software
The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) are warning organizations of malicious attacks using legitimate remote monitoring and management (RMM) software. IT service providers use RMM applications to remotely manage their clients’ networks and endpoints, but threat actors are abusing these tools to […] more…From zero to Zanubis
A few weeks ago we stumbled upon a suspicious Android sample from a tweet from @malwrhunterteam which was only detected by four antivirus engines: Antivirus verdicts didn’t provide specifics about the malware family other than it might be either a banking trojan or spyware, so a first approach to continue the investigation is finding other […] more…Staying safer online from phishing and other attacks
When you’re online, the world is at your fingertips. You can do amazing things like stream the latest movies while they’re still in theaters! Or you can enjoy the convenience of online shopping and avoiding the DMV by renewing your driver’s license remotely. This is possible because we’re able to communicate with these organizations through many different channels and we trust them. Unfortunately, many bad actors have taken advantage of this trust […] more…How to Tell Whether a Website Is Safe or Unsafe
It’s important to know that not all websites are safe to visit. In fact, some sites may contain malicious software (malware) that can harm your computer or steal your personal contact information or credit card numbers. Phishing is another common type of web-based attack where scammers try to trick you into giving them your personal […] more…What Is Internet Security?
Internet security is a broad term that refers to a wide range of tactics that aim to protect activities conducted over the internet. Implementing internet security measures helps protect users from different online threats like types of malware, phishing attacks, scams, and even unauthorized access by hackers. In this article, we highlight the importance of […] more…Threat-landscape of Financial attacks
Financial institutions have been a traditional target for all kinds of attacks. We wanted to understand what kind of malware families have been used against them in recent cases and track their evolution. It is not easy, though, having details on artifacts used in such attacks. Our approach was cross-checking OSINT data related to attacks […] more…Lock Down & Level Up: Protect Your Online Gaming from Hackers
As a gamer, you love the stuff you’ve racked up over the years—that rare Fortnite skin from six seasons ago, a complete set of Tier 20 armor in World of Warcraft, or a Steam account loaded with your favorite titles. Hackers love it too. Because they can make money off it. Hackers have been stealing […] more…Telehealth: A New Frontier in Medicine—and Security
Telehealth today doesn’t just involve chatting with a doctor via a video-conferencing application. It’s become an entire collection of rapidly developing technologies and products that includes specialized applications, wearable devices, implantable sensors, and cloud databases, many of which have only appeared in the past couple of years. However, telehealth in its current form began to […] more…MoonBounce: the dark side of UEFI firmware
What happened? At the end of 2021, we were made aware of a UEFI firmware-level compromise through logs from our Firmware Scanner, which has been integrated into Kaspersky products since the beginning of 2019. Further analysis has shown that a single component within the inspected firmware’s image was modified by attackers in a way that […] more…Kaspersky Managed Detection and Response: interesting cases
Kaspersky Managed Detection and Response (MDR) provides advanced protection against the growing number of threats that bypass automatic security barriers. Its capabilities are backed by a high-professional team of security analysts operating all over the world. Each suspicious security event is validated by our analysts complementing the automatic detection logic and letting us continuously improve […] more…The story of the year: ransomware in the headlines
In the past twelve months, the word “ransomware” has popped up in countless headlines worldwide across both print and digital publications: The Wall Street Journal, the BBC, the New York Times. It is no longer just being discussed by CISOs and security professionals, but politicians, school administrators, and hospital directors. Words like Babuk and REvil […] more…More information
- What happens when you put iPhone chips in Macs?
- Dozens of Teens Arrested Over DDoS Attacks
- Apple must take another brick from its wall, says EU
- Microsoft Edge Scripting Engine CVE-2018-8279 Remote Memory Corruption Vulnerability
- Mystery vandals are cutting fiber-optic cables in California – how worried should we be?
- FCC’s ruling that Google’s WiFi snooping is legal sets horrible precedent
- Microsoft Internet Explorer CVE-2015-1765 Information Disclosure Vulnerability
- Why facial recognition couldn’t identify Boston bombing suspects
- IBM Security Guardium Big Data Intelligence CVE-2019-4307 Information Disclosure Vulnerability
- Morocco Rights Advocates Targeted by Spyware: Amnesty