2020 outlook for cybersecurity legislation
As the partisan divide in Washington widens during this 116th Congress, the prospects of enacting any meaningful legislation that bolsters the nation’s cybersecurity seem, at first blush, dim. Of the nearly 300 pieces of legislation that touch on some aspect of cybersecurity, or more urgently, election security, introduced since the current Congress began last year, […] more…Don’t RSVP to This Holiday Party: Protect Yourself From the Emotet Trojan
The holiday season is officially among us. From last-minute holiday shopping to attending countless parties, this time of year keeps users busy. The holiday season is an especially busy time for cybercriminals as well. According to Bleeping Computer, the cybercriminals behind the Emotet trojan have been targeting users with a new spam campaign that impersonates […] more…Here’s How the California Consumer Privacy Act Will Affect You
Then last June, California responded with its own bill called the California Consumer Privacy Act (CCPA). This bill, which goes into effect January 2020, broadens the scope of privacy rights for Californians, including data access rights and a limited private right of action. Essentially, the CCPA gives users the right to know just how companies […] more…OilRig’s Poison Frog – old samples, same trick
After we wrote our private report on the OilRig leak, we decided to scan our archives with our YARA rule, to hunt for new and older samples. Aside from finding some new samples, we believe we also succeeded in finding some of the first Poison Frog samples. Poison Frog We’re not quite sure whether the […] more…Cybercriminal Speaks With Child via Hacked Smart Camera: How You Can Stay Protected
IoT devices enter our homes out of ease and convenience, as the gadgets often optimize or streamline ordinary tasks — such as notifying us who’s at the front door or providing us home surveillance at the touch of a button. And though these devices are helpful, they also provide cybercriminals with a way to enter […] more…DDoS Attacks and IoT Exploits: New Activity from Momentum Botnet
by Aliakbar Zahravi We recently found notable malware activity affecting devices running Linux, a platform that has battled numerous issues just this year. Further analysis of retrieved malware samples revealed that these actions were connected to a botnet called Momentum (named for the image found in its communication channel). We found new details on the […] more…(Almost) Hollow and Innocent: Monero Miner Remains Undetected via Process Hollowing
By Arianne Dela Cruz, Jay Nebre and Augusto Remillano II As the value of cryptocurrencies increased (after a short dip in 2018), we observed increased activity from cryptocurrency mining malware this year, particularly infections and routines involving Monero miners. Over a span of a few months, we came across an infection routine that exploited vulnerabilities […] more…Waterbear is Back, Uses API Hooking to Evade Security Product Detection
By Vickie Su, Anita Hsieh, and Dove Chiu Waterbear, which has been around for several years, is a campaign that uses modular malware capable of including additional functions remotely. It is associated with the cyberespionage group BlackTech, which mainly targets technology companies and government agencies in East Asia (specifically Taiwan, and in some instances, Japan […] more…7 Tips to Make Sure Smartphone Use Doesn’t Ruin Holiday Gatherings
The gravy wasn’t the only thing steaming at the Thanksgiving table this year. Grandma wasn’t happy. It turns out that those shapes that looked like socks draped over the living room furniture were actually teenagers glued to their smartphones — teenagers Grandma had repeatedly asked to set the table. And if you knew Grandma, you […] more…Here’s What You Need to Know About Your Data Privacy in 2020
The end of 2019 is rapidly approaching, and with the coming of a new year comes the perfect opportunity to reflect on the past and plan for the months ahead. What will 2020 bring when it comes to cybersecurity and what can users do to ensure that they’re protected in the upcoming year? From new […] more…APT review: what the world’s threat actors got up to in 2019
What were the most interesting developments in terms of APT activity during the year and what can we learn from them? This is not an easy question to answer, because researchers have only partial visibility and it´s impossible to fully understand the motivation for some attacks or the developments behind them. However, let´s try to […] more…Cyberthreats to financial institutions 2020: Overview and predictions
Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Corporate security prediction 2020 Key events 2019 Large-scale anti-fraud bypass: Genesis digital fingerprints market uncovered Multi-factor authentication (MFA) and biometric challenges Targeted attack groups specializing in financial institutions: splitting and globalization ATM malware becomes […] more…7 Ways to Wreck a Cybercrook’s Holidays
’Tis the season for giving and who better to give a giant headache to than the digital scammers working overtime to wreck our holidays? Can we spot and unravel every scam out there? Probably not. But, by taking a few minutes to get equipped to click, we can dodge common traps laid by cybercrooks and […] more…IT threat evolution Q3 2019. Statistics
These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network: Kaspersky solutions blocked 989,432,403 attacks launched from online resources in 203 countries across the globe. 560,025,316 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by […] more…IT threat evolution Q3 2019
Targeted attacks and malware campaigns Mobile espionage targeting the Middle East At the end of June we reported the details of a highly targeted campaign that we dubbed ‘Operation ViceLeaker’ involving the spread of malicious Android samples via instant messaging. The campaign affected several dozen victims in Israel and Iran. We discovered this activity in […] more…RevengeHotels: cybercrime targeting hotel front desks worldwide
RevengeHotels is a targeted cybercrime malware campaign against hotels, hostels, hospitality and tourism companies, mainly, but not exclusively, located in Brazil. We have confirmed more than 20 hotels that are victims of the group, located in eight states in Brazil, but also in other countries such as Argentina, Bolivia, Chile, Costa Rica, France, Italy, Mexico, […] more…More information
- Jitters over U.S. surveillance could undermine the Internet
- Resolved: TSM Server Restart and Upgrade
- New, more-powerful IoT botnet infects 3,500 devices in 5 days
- Cut through the FUD in online security tips
- WoSign Changes Leadership Due to Certificate Incidents
- NASA’s bold bet on Starship for the Moon may change spaceflight forever
- Amid breach fallout, Global Payments struggles with public message
- Business-driven data protection
- PHI security demands leave life coach feeling doomed
- Google website’s Vulnerabilities of 2012 [updated]