We know what your kids did this summer
For many kids and teenagers, summer is all about ditching school books in favor of hobbies and fun. Every year we release a report on children’s interests, as reflected in their online activity. This summer, we investigated what they prefer in their free time. The Parental Control module in Kaspersky Lab products protects children from […] more…What are botnets downloading?
Spam mailshots with links to malware and bots downloading other malware are just a couple of botnet deployment scenarios. The choice of infectious payload is limited only by the imagination of the botnet operator or customer. It might be a ransomware, a banker, a miner, a backdoor, the list goes on, and you don’t need […] more…The Urpage Connection to Bahamut, Confucius and Patchwork
By Daniel Lunghi and Ecular Xu In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes. In this case we dig deeper into the possible connection between cyberattacks by focusing on the similarities an unnamed threat actor shares with Confucius, Patchwork, […] more…Loki Bot: On a hunt for corporate passwords
Starting from early July, we have seen malicious spam activity that has targeted corporate mailboxes. The messages discovered so far contain an attachment with an .iso extension that Kaspersky Lab solutions detect as Loki Bot. The malware’s key objective is to steal passwords from browsers, messaging applications, mail and FTP clients, and cryptocurrency wallets. Loki […] more…BusyGasper – the unfriendly spy
In early 2018 our mobile intruder-detection technology was triggered by a suspicious Android sample that, as it turned out, belonged to an unknown spyware family. Further investigation showed that the malware, which we named BusyGasper, is not all that sophisticated, but demonstrates some unusual features for this type of threat. From a technical point of […] more…The rise of mobile banker Asacub
We encountered the Trojan-Banker.AndroidOS.Asacub family for the first time in 2015, when the first versions of the malware were detected, analyzed, and found to be more adept at spying than stealing funds. The Trojan has evolved since then, aided by a large-scale distribution campaign by its creators (in spring-summer 2017), helping Asacub to claim top […] more…Back-to-School Cybersecurity 101: #RT2Win an A+ Worthy Prize
The days are getting shorter and your bags are (finally) unpacked from the annual family vacation. Summer is officially coming to an end, and parents and kids are switching gears from hot afternoons filled with play dates and summer camp to early mornings and long school days. But as fun as a new school year […] more…Sharing and Caring
How To Safely Post Images Of Your Kids Online I’m not a big sharer online but I do love popping up a few pics of an important family milestone on Facebook. Whether it’s a child starting a new school, an amazing family holiday or a hilarious birthday pic, sharing family snaps online is a great […] more…Maintaining a Culture of Security Requires Ongoing Attention
Creating a culture that emphasizes a security-first mindset requires more than just updating the vision statement. HR professionals and people managers know very well that creating a sustainable organizational culture that makes any company vision a reality is a never-ending work in progress. Simply introducing the vision and values, and creating a sense of buy-in […] more…Check for the Security-First Mindset Across All Teams
We know we need to encourage our teams to think security-first across every department. But what does this really mean in a practical application? For security companies, it might be less of a leap to bring a security mindset to legal, procurement, or marketing teams. For organizations with their core business in another industry, it […] more…Train your Cybersecurity Team for Peak Performance
Whether you’re racing to fill cybersecurity jobs to keep up with the changing threat landscape or support your company’s rapid growth, getting your team trained and at the top of their game is a high priority. You need to ensure all new hires are operating with the same baseline of knowledge and skills as your […] more…Operation AppleJeus: Lazarus hits cryptocurrency exchange with fake installer and macOS malware
Overview Lazarus has been a major threat actor in the APT arena for several years. Alongside goals like cyberespionage and cybersabotage, the attacker has been targeting banks and other financial companies around the globe. Over the last few months, Lazarus has successfully compromised several banks and infiltrated a number of global cryptocurrency exchanges and fintech […] more…Dark Tequila Añejo
Dark Tequila is a complex malicious campaign targeting Mexican users, with the primary purpose of stealing financial information, as well as login credentials to popular websites that range from code versioning repositories to public file storage accounts and domain registrars. A multi-stage payload is delivered to the victim only when certain conditions are met; avoiding […] more…Back to School: 5 Cybersecurity Habits to Teach Your Kids
With back-to-school time already here, cybersecurity should be at the forefront of every parent’s mind. Kids are exposed to more devices – both in the classroom and at home. While their school may already be taking precautions to protect their data while they’re in the classroom, and many of their personal phones have parental controls […] more…Use-after-free (UAF) Vulnerability CVE-2018-8373 in VBScript Engine Affects Internet Explorer to Run Shellcode
by Elliot Cao (Trend Micro Security Research) with Trend Micro’s Zero Day Initiative (ZDI) We discovered a high-risk Internet Explorer (IE) vulnerability in the wild on July 11, just a day after Microsoft’s July Patch Tuesday. We immediately sent Microsoft the details to help fix this flaw. While this vulnerability, now designated as CVE-2018-8373, affects […] more…Microsoft Cortana Allows Browser Navigation Without Login: CVE-2018-8253
A locked Windows 10 device with Cortana enabled on the lock screen allows an attacker with physical access to the device to do two kinds of unauthorized browsing. In the first case, the attacker can force Microsoft Edge to navigate to an attacker-controlled URL; in the second, the attacker can use a limited version of […] more…More information
- Former Uber CISO Joe Sullivan Found Guilty Over Breach Cover-Up
- Why knowing the location of your attacker is key in defending against DDoS
- Google Now Offering Up to $250,000 for Chrome Vulnerabilities
- Crowdfunding for Acquiring Shadow Brokers Exploits Canceled
- ‘Unbreakable’ security that wasn’t: True tales of tech hubris
- Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .NET Framework
- NATO Opens Defense Innovation Challenge Seeking C4ISR Solutions
- Suspected NSA tool hackers dump more cyberweapons in farewell
- Redhat KeyCloak CVE-2019-14837 Information Disclosure Vulnerability
- Resolved: Known Error impacting Yammer