IT threat evolution Q1 2020
Targeted attacks and malware campaigns Operation AppleJeus: the sequel In 2018, we published a report on Operation AppleJeus, one of the more notable campaigns of the threat actor Lazarus, currently one of the most active and prolific APT groups. One notable feature of this campaign was that it marked the first time Lazarus had targeted […] more…IT threat evolution Q2 2018
Targeted attacks and malware campaigns Operation Parliament In April, we reported the workings of Operation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world – with its main focus in the MENA (Middle East and North Africa) region, especially Palestine. The attacks, which started early in 2017, target parliaments, […] more…Energetic Bear/Crouching Yeti: attacks on servers
Energetic Bear/Crouching Yeti is a widely known APT group active since at least 2010. The group tends to attack different companies with a strong focus on the energy and industrial sectors. Companies attacked by Energetic Bear/Crouching Yeti are geographically distributed worldwide with a more obvious concentration in Europe and the US. In 2016-2017, the number […] more…Spam and phishing in 2016
The year in figures According to Kaspersky Lab, in 2016: The proportion of spam in email flows was 58.31%, which is 3.03 percentage points more than in 2015. 62.16% of spam emails were no more than 2 KB in size. 12.08% of spam was sent from the US. Trojan.Win32.Bayrob was the most popular malware family […] more…DDoS attacks in Q4 2016
News Overview Without doubt, 2016 was the year of Distributed Denial of Service (DDoS) with major disruptions in terms of technology, attack scale and impact on our daily life. In fact, the year ended with massive DDoS attacks unseen before, leveraging Mirai botnet technology, whose first appearance was covered in our last DDoS Intelligence Report. […] more…More information
- July 2013 Patch Tuesday – Windows, IE, Flash, Shockwave and ColdFusion
- Flaws in Ruckus Access Points Expose Organizations to Attacks
- New ratings point to keyless cars that can stand up to relay attacks
- McAfee Protects Against Suspicious Email Attachments
- McAfee Security Scanner with Java is Not Bloatware, and Here’s Why
- Australian government announces its National Cloud Computing Strategy
- Microsoft Stores Windows 10 Encryption Keys in the Cloud
- Billabong Hacked Again, Hackers Claim to Have Obtained 37,000 Account Details
- Microsoft Releases Out-of-Band Update for Kerberos Authentication Issues
- Computer scientists develop a simple tool to tell if websites suffered a data breach