How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Using our own telemetry data and intelligence reports as well as publicly available information, we’ve looked at the top vulnerabilities and applications exploited by attackers. Read Full Article
Industrial cybersecurity threat landscape
Expansion of the Internet makes ICS easier prey to attackers. Taking into account that initially many ICS solutions and protocols were designed for isolated environments, such availability often provides a malicious user with multiple capabilities to cause impact to the infrastructure behind the ICS due to lack of security controls. Read Full Article
Kaspersky Security Bulletin 2015. Overall statistics for 2015
In 2015, virus writers demonstrated a particular interest in exploits for Adobe Flash Player. The proportion of relatively simple programs used in mass attacks was growing. Attackers have mastered non-Windows platforms – Android and Linux: almost all types of malicious programs are created and used for these platforms. Read Full Article
Kaspersky Security Bulletin 2015. Evolution of cyber threats in the corporate sector
The data collected from Kaspersky Lab products shows that the tools used to attack businesses differ from those used against home users. Let’s have a look back at the major incidents of 2015 and at the new trends we have observed in information security within the business environment. Read Full Article
The second round of CODE BLUE in Japan
A cutting-edge IT security conference, was held from 18th -19th December. It was the second round, following its first occurrence in February 2014. Read Full Article
The echo of Stuxnet
At Kaspersky Lab we regularly conduct threat studies dedicated to a particular type of cyber threat. This summer we decided to look closely at what versions of Windows Operating System are most popular among our users and also at what kind of vulnerabilities are used in cyber-attacks involving exploits. Read Full Article
IT Threat Evolution: Q3 2013
Q3 in figures Overview Targeted Attacks / APT NetTraveler’s new tricks Icefog Kimsuky Malware Stories Author of Blackhole exploit kit arrested New router botnet emerged Web security and data breaches Vodafone Germany breached Apple Developer Area hacked High Profile Domains… Read Full Article
IT Threat Evolution: Q3 2012
During Q3 2012, over 9,000 new malicious .dex files were added to our malware collection Read Full Article
IT Threat Evolution: Q2 2012
According to KSN data, Kaspersky Lab products detected and neutralized over 1 billion threats in Q2 2012. Read Full Article
IT Threat Evolution: Q1 2012
According to KSN data, Kaspersky Lab products detected and neutralized almost 1 billion malicious objects in Q1 2012. Read Full Article