HackDig : Dig high-quality web security articles

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

Introduction When reports of a cyberattack appear in the headlines, questions abound regarding who launched it and why. Even if an attacker has what are to it perfectly rational reasons for conducting such an attack, these reasons are often known only to them. The rest of the world, including the victims of the attack, must often engage in some degree of spe
Publish At:2022-06-20 06:17 | Read:733 | Comments:0 | Tags:Publications APT Cybercrime Cybercrime Legislation Malware T

Managed detection and response in 2021

Kaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house resources to protect their infrastructure from the growing number and complexity of threats in real time. We collect telemetry from clients’ networks and analyze it using machine learning and artificial intellig
Publish At:2022-05-26 07:42 | Read:1483 | Comments:0 | Tags:Publications Industrial threats Internal Threats Statistics

The Verizon 2022 DBIR

The Verizon 2022 Data Breach Investigations Report is out. We are proud to collaborate as a supporting contributor to this year’s data efforts once again and to have contributed for the past 8 years. The report provides interesting analysis of a full amount of global incident data. Several things stand out in the 2022 report: Ransomware challenges co
Publish At:2022-05-25 14:12 | Read:1741 | Comments:0 | Tags:Publications APT Botnets Cyber espionage Cybercrime Ransomwa

What’s wrong with automotive mobile apps?

Introduction The recent story about the 19-year-old hacker who took control of several dozen Tesla cars has become something of a sensation. We already know that there was an issue with a third-party app that enabled access to data from Teslas. This made it possible for the security researcher to lock and unlock the cars, turn the lights on and off, and even
Publish At:2022-05-25 06:16 | Read:1341 | Comments:0 | Tags:Publications Connected car Data Protection Internet of Thing

Evaluation of cyber activities and the threat landscape in Ukraine

Introduction When the war in Ukraine broke out, many analysts were surprised to discover that what was simultaneously happening in the cyber domain did not match their predictions[1]. Since the beginning of the fighting, new cyberattacks taking place in Ukraine have been identified every week, which lead to a variety of interpretations – and indeed a global
Publish At:2022-05-17 11:29 | Read:1622 | Comments:0 | Tags:Publications APT Industrial control systems Ransomware Targe

New ransomware trends in 2022

Ahead of the Anti-Ransomware Day, we summarized the tendencies that characterize ransomware landscape in 2022. This year, ransomware is no less active than before: cybercriminals continue to threaten nationwide retailers and enterprises, old variants of malware return while the new ones develop. Watching and assessing these tendencies not only provides us wi
Publish At:2022-05-11 10:14 | Read:1411 | Comments:0 | Tags:Publications Cybercrime Data Encryption Malware Descriptions

The State of Stalkerware in 2021

p> The state of stalkerware in 2021 (PDF) Main findings of 2021 Every year Kaspersky analyzes the use of stalkerware around the world to better understand the threat it poses. We partner with stakeholders across public and private sectors to raise awareness and find solutions to best tackle this important issue. Stalkerware enables people to secretly spy on
Publish At:2022-04-12 06:09 | Read:1961 | Comments:0 | Tags:Publications Cyberbullying Cybercrime Internet of Things Mob

A Bad Luck BlackCat

p>In early December 2021, a new ransomware actor started advertising its services on a Russian underground forum. They presented themselves as ALPHV, a new generation Ransomware-as-a-Service (RaaS) group. Shortly afterwards, they dialed up their activity, infecting numerous corporate victims around the world. The group is also known as BlackCat. One of the b
Publish At:2022-04-07 06:09 | Read:2250 | Comments:0 | Tags:Publications Cybercrime Data Encryption Malware Descriptions

Webinar on cyberattacks in Ukraine – summary and Q&A

About the webinar On March 10, 2022 Kaspersky’s Global Research and Analysis Team (GReAT) shared their insights into the current (and past) cyberattacks in Ukraine. In this post we address the questions that we did not have the time to answer and provide the Indicators of Compromise (IoCs) that can help you defend against the identified threats. You ca
Publish At:2022-03-14 06:08 | Read:3468 | Comments:0 | Tags:Publications APT Cyber weapon DDoS-attacks Hackers Targeted

Financial cyberthreats in 2021

The year 2021 was eventful in terms of digital threats for organizations and individuals, and financial institutions were no exception. Throughout the past year, we have seen cybercriminals continue to actively target our users with tools and techniques that emerged due to the pandemic. Imperfections in the transition to remote/hybrid work continue to pose a
Publish At:2022-02-23 07:21 | Read:2045 | Comments:0 | Tags:Publications Amazon Cryptocurrencies eBay Emotet Financial m

Telehealth: A New Frontier in Medicine—and Security

Telehealth today doesn’t just involve chatting with a doctor via a video-conferencing application. It’s become an entire collection of rapidly developing technologies and products that includes specialized applications, wearable devices, implantable sensors, and cloud databases, many of which have only appeared in the past couple of years. Howeve
Publish At:2022-02-01 06:07 | Read:3891 | Comments:0 | Tags:Publications Cybercrime Data leaks Data theft Medical threat

Choosing Christmas gifts for kids: Squid Game and Huggy Wuggy are trending

As the holidays approach, many of us are trying to figure out what to buy our family and friends. We especially want to make this time of year festive for kids. If you want to delight children, you need to know what they’re interested in: what LEGO set they’re dreaming about, what superheroes they’d be happy to see on their pajamas, and wha
Publish At:2021-12-22 06:06 | Read:3129 | Comments:0 | Tags:Publications Content Filtering Online Games Parental control

Answering Log4Shell-related questions

Important notice On December 18th, Log4j version 2.17.0 was released to address open vulnerabilities. It is highly recommended to update your systems as soon as possible. History of the Log4j library vulnerabilities CVE-2021-44228 (initial vulnerability) – partly fixed in 2.15.0 CVE-2021-45046 (present in Log4j 2.15.0) – fixed in 2.16.0 CVE-202
Publish At:2021-12-20 13:58 | Read:3014 | Comments:0 | Tags:Publications DDoS-attacks Malware Technologies Proof-of-Conc

Kaspersky Managed Detection and Response: interesting cases

Kaspersky Managed Detection and Response (MDR) provides advanced protection against the growing number of threats that bypass automatic security barriers. Its capabilities are backed by a high-professional team of security analysts operating all over the world. Each suspicious security event is validated by our analysts complementing the automatic detection
Publish At:2021-12-15 06:06 | Read:5545 | Comments:0 | Tags:Publications APT MDR MuddyWater Security technology Targeted

Black Friday 2021: How to Have a Scam-Free Shopping Day

Fact 1: cybercriminals love to exploit big holidays for personal gain. Case in point: we’re already seeing scams targeting World Cup fans more than a year out from the event. Fact 2: the retail sector, particularly e-commerce, has always been popular with cybercriminals. In Q3 2021, online stores were in second place by share of recorded phishing attac
Publish At:2021-11-22 06:06 | Read:3374 | Comments:0 | Tags:Publications Electronic Payments Internet Banking Malware St


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud