IT threat evolution Q1 2020
Targeted attacks and malware campaigns Operation AppleJeus: the sequel In 2018, we published a report on Operation AppleJeus, one of the more notable campaigns of the threat actor Lazarus, currently one of the most active and prolific APT groups. One notable feature of this campaign was that it marked the first time Lazarus had targeted […] more…IT threat evolution Q2 2018
Targeted attacks and malware campaigns Operation Parliament In April, we reported the workings of Operation Parliament, a cyber-espionage campaign aimed at high-profile legislative, executive and judicial organizations around the world – with its main focus in the MENA (Middle East and North Africa) region, especially Palestine. The attacks, which started early in 2017, target parliaments, […] more…Energetic Bear/Crouching Yeti: attacks on servers
Energetic Bear/Crouching Yeti is a widely known APT group active since at least 2010. The group tends to attack different companies with a strong focus on the energy and industrial sectors. Companies attacked by Energetic Bear/Crouching Yeti are geographically distributed worldwide with a more obvious concentration in Europe and the US. In 2016-2017, the number […] more…Spam and phishing in 2016
The year in figures According to Kaspersky Lab, in 2016: The proportion of spam in email flows was 58.31%, which is 3.03 percentage points more than in 2015. 62.16% of spam emails were no more than 2 KB in size. 12.08% of spam was sent from the US. Trojan.Win32.Bayrob was the most popular malware family […] more…More information
- Russian hackers were indeed behind DNC breach, claims another security firm
- Cryptocurrencies and the Revolution in Cybercrime Economics
- Disrupting the Flow: Exposed and Vulnerable Water and Energy Infrastructures
- Travel database exposed PII on US government employees
- Sally Beauty investigates possible second card breach
- Even with the latest iOS 12 update, your iPhone’s lockscreen is unsafe
- Microsoft Internet Explorer CVE-2015-6056 Scripting Engine Remote Memory Corruption Vulnerability
- Exposing the security weaknesses we tend to overlook
- Technical Details Released for Recently Patched Zyxel Firewall Vulnerabilities
- iOS 9 is now on 75% of Apple’s mobile devices