IT threat evolution Q1 2021
Targeted attacks Putting the ‘A’ into APT In December, SolarWinds, a well-known IT managed services provider, fell victim to a sophisticated supply-chain attack. The company’s Orion IT, a solution for monitoring and managing customers’ IT infrastructure, was compromised by threat actors. This resulted in the deployment of a custom backdoor, named Sunburst, on the networks […] more…Stay Ahead of Misinformation – 5 Ways to Combat Fake News
Stay ahead of misinformation – 5 ways to combat fake news Finding information in this increasingly digital world has never been easier. Our mobile phones dictate top headlines before we even get out of bed, and even our routers can perform complex searches via voice. We see the impact of this easy access on both our consumption and the sharing of information. Just as it’s easy for us to perform a quick search and send the relevant results to our social groups, it’s also simple for bad actors to create and […] more…Mobile malware evolution 2015
The year in figures In 2015, Kaspersky Lab detected the following: 2,961,727 malicious installation packages 884,774 new malicious mobile programs – a threefold increase from the previous year 7,030 mobile banking Trojans Trends of the year Rise in the number of malicious attachments the user is unable to delete. Cybercriminals actively using phishing windows to […] more…More information
- Researchers set new cryptanalysis world record for pairing-based cryptography
- ABN looked at using undercover security staff to prevent cyber attacks
- WannaCry and Lazarus Group – the missing link?
- The Term "Threat Intelligence" is Poisoned. It Does Not Mean What You Think it Means.
- Update: Digital Identity Management Console outage
- Hello from #RSA2016!
- CoreOS CEO: Containers are just the beginning
- Researcher creates proof-of-concept worm for network-attached storage devices
- HackerOne Surpasses $82 Million in Paid Bounties
- Latest OpenSSL flaws can lead to information leakage, code execution and DoS