Events

The way to a safer internet?

A very important and worthwhile InSafe initiative starts today. Dubbed ‘Safer Internet Day’, the initiative is designed to raise awareness of cyber threats. The target audience in this case, however, isn’t the corporate IT-type, but users, specifically targeting parents and children.

This year’s Safer Internet Day attempts to ride on the coattails of success of blogging and will distribute its message using exactly the same vehicle.
Comments from special guests and site visitors about safe blogging will be collected and posted over the next 24 hours at:
http://www.saferinternet.org/ww/en/pub/insafe/index.htm

While any properly-managed event that raises awareness of internet security threats is a good thing, and has my full support, I’d like to stress that internet security requires users to be on their guard every day of the year. As RUNET statistics indicate, internet scams have nearly doubled since December, 2005, when fraudulent schemes were detected in 10% of filtered spam-traffic. Today that number is close to 22%.

These numbers give a clear indication of the size of the problem. So is it a Safer Internet or not? Maybe we should rename this day Unsafer Internet Day?

The way to a safer internet?

Your email address will not be published. Required fields are marked *

 

Reports

The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Subscribe to our weekly e-mails

The hottest research right in your inbox