Ads

Tag: Kaspersky

Industrial Sector in the Middle East Target Mac Computers, Security Researchers...

0
According to Kaspersky security researchers, a malware campaign targeting the Middle East's industrial sector has been expanded to include Mac systems. The effort, dubbed WildPressure,...

China-Linked ‘Cycldek’ Targeting Government and Military Entities in Vietnam

0
According to a study from anti-malware vendor Kaspersky, the China-linked cyber-espionage group Cycldek is displaying growing sophistication in a series of recent attacks targeting...

Russia, Brazil and USA Were the Countries Most Affected by Stalkerware...

0
Russia, Brazil, and the United States of America were the countries most impacted by stalkerware last year, according to new research from cybersecurity firm...

The Threat Group Evilnum was Observed Using Updated Tactics and Tools...

0
The threat group monitored as Evilnum was observed using modified tactics and instruments in recent attacks, the Nocturnus research team from Cybereason reported last...

Antivirus Apps for Android

0
Android security apps to block malware and phishing attempts are now absolutely essential. It is necessary if you want to operate a secure smartphone...

Current Kaspersky Tool Helps Risk Actors to Attribute Malware

0
This week, Kaspersky released a threat intelligence solution designed to help attribute samples of malware to known advanced persistent threat ( APT) groups. The new...

Russian Hacker Group for Control of Malware Implants Using HTTP Status...

0
Kaspersky 's security researchers have found a new version of COMpfun malware which uses a mechanism that relies on HTTP status codes to control...

Kaspersky Unveils ICS Vulnerabilities Database

0
Kaspersky on Thursday announced the ICS Vulnerabilities Database, a new service designed to help industrial organizations keep track of relevant security flaws and protect...

Unique Kaspersky AV User ID Allowed 3rd-Party Web Tracking

0
Kaspersky antivirus solutions have injected a unique identification number for each device in the web pages visited by its customers. This began at the...

Malicious self – hotkey scripts for stealing information, Remote access systems

0
Attackers target potential victims through a malicious AutoHotkey script to prevent detection and stolen information, to lower payloads and to access compromised machines remotely...