HackDig : Dig high-quality web security articles for hackers

An overview of targeted attacks and APTs on Linux

Perhaps unsurprisingly, a lot has been written about targeted attacks on Windows systems. Windows is, due to its popularity, the platform for which we discover most APT attack tools. At the same time, there’s a widely held opinion that Linux is a secure-by-default operating system that isn’t susceptible to malicious code. It’s certainly tru
Publish At:2020-09-10 06:04 | Read:259 | Comments:0 | Tags:Featured Publications APT Cyber espionage Linux Targeted Att

Digital Education: The cyberrisks of the online classroom

This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around the world were forced to close their doors. By April 29, 2020, more than 1.2 billion children across 186 countries were impacted by school closures. Shortly after schools began to transition to emergency remote learning, it became c
Publish At:2020-09-04 08:09 | Read:291 | Comments:0 | Tags:Featured Publications Malicious spam Malware Statistics RDP

Incident Response Analyst Report 2019

 Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility of adversaries’ cyber-incident tactics and techniques used in the wild. In this report, we share our teams’ conclusions and analysis based on incident responses and statistics from 2019. As well as a ran
Publish At:2020-08-06 07:07 | Read:304 | Comments:0 | Tags:Featured Publications Data leaks Industrial threats Maliciou

Web skimming with Google Analytics

Web skimming is a common class of attacks generally aimed at online shoppers. The principle is quite simple: malicious code is injected into the compromised site, which collects and sends user-entered data to a cybercriminal resource. If the attack is successful, the cybercriminals gain access to shoppers’ payment information. To make the data flow to
Publish At:2020-06-22 06:07 | Read:576 | Comments:0 | Tags:Featured Publications Security Websites Website Hacks

Do cybercriminals play cyber games during quarantine?

Thanks to the coronavirus pandemic, the role of the Internet in our lives has undergone changes, including irreversible ones. Some of these changes are definitely for the better, some are not very good, but almost all of them in some way affect digital security issues. We decided to take a closer look at the changes around us through the prism of information
Publish At:2020-06-17 06:26 | Read:456 | Comments:0 | Tags:Featured Publications Gaming malware Malware Statistics Onli

Explicit content and cyberthreats: 2019 report

‘Stay at home’ is the new motto for 2020 and it has entailed many changes to our daily lives, most importantly, in terms of our digital content consumption. With users opting to entertain themselves online, malicious activity has grown. Over the past two years we have reviewed how adult content has been used to spread malware and abuse users̵
Publish At:2020-06-15 06:58 | Read:541 | Comments:0 | Tags:Featured Publications Adware Malware Malware Statistics Mobi

Kids on the Web in 2020

Technology is what is saving us from a complete change in the way of life in a world of a raging pandemic. It keeps the educational process going, relieves the shortage of human communication and helps us to live life as fully as possible given the isolation and social distancing. Many adults, and children too, have come to realize that the computer is not j
Publish At:2020-06-03 06:33 | Read:481 | Comments:0 | Tags:Featured Publications Parental control Security technology

Verizon’s 2020 DBIR

Verizon’s 2020 DBIR is out, you can download a copy or peruse their publication online. Kaspersky was a contributor once again, and we are happy to provide generalized incident data from our unique and objective research. We have contributed to this project and others like it for years now. This year’s ~120 page report analyses data from us and
Publish At:2020-05-24 07:11 | Read:514 | Comments:0 | Tags:Publications Cybercrime Data theft Malware Statistics Ransom

Financial Cyberthreats in 2019

Methodology Financial cyberthreats are malicious programs that target users of services such as online banking, e-money, and cryptocurrency, or that attempt to gain access to financial organizations and their infrastructure. These threats are usually accompanied by spam and phishing activities, with malicious users creating fake financial-themed pages and em
Publish At:2020-04-16 07:00 | Read:914 | Comments:0 | Tags:Featured Publications Apple MacOS ATM Electronic Payments Fi

Black Friday Alert 2019: Net Shopping Bag of Threats

Every year, Kaspersky releases an annual Black Friday alert to highlight how fraudsters may capitalize on increased levels of online shopping at this time of year when many brands are offering their customers appealing discounts. In the rush to get a big discount or, even more panic-inducing, a limited time offer, many shoppers lose all sense of vigilance. C
Publish At:2019-11-22 18:05 | Read:1128 | Comments:0 | Tags:Publications Electronic Payments Malware Statistics Phishing

5G security and privacy for smart cities

The 5G telecommunications revolution is imminent. It is the next generation of cellular network, making use of the existing 4G LTE in addition to opening up the millimeter wave band. 5G will be able to welcome more network-connected devices and increase speeds considerably for users. It will serve as the foundation for advanced services, including: 8k strea
Publish At:2019-11-22 18:05 | Read:1232 | Comments:0 | Tags:Publications Cyber espionage DDoS-attacks infrastructure Int

The cake is a lie! Uncovering the secret world of malware-like cheats in video games

In 2018, the video game industry became one of the most lucrative in the world, generating $43.4 billion in revenue within the United States alone. When we consider that video game licenses are only a fraction of the total market, it becomes clear just how important the industry is compared to the movie and music industries, for example. Moreover, conservati
Publish At:2019-11-12 01:05 | Read:1508 | Comments:0 | Tags:Featured Publications Electronic Payments Fraud Online Games

Data collectors

Who owns data owns the world. And with the Internet taking over much of our daily lives, it has become far easier and faster to receive, collect, and analyze data. The average user cannot even imagine how much data gets collected on them. Besides technical information (for example, about a smartphone) harvested by a manufacturer to patch vulnerabilities, com
Publish At:2019-10-23 06:05 | Read:1557 | Comments:0 | Tags:Featured Publications advertising networks Data Protection F

A glimpse into the present state of security in robotics

 Download full report (PDF) The world of today continues its progress toward higher digitalization and mobility. From developments in the Internet of Things (IoT) through augmented reality to Industry 4.0, whichrely on stronger automation and use of robots, all of these bring more efficiency to production processes and improves user experience across th
Publish At:2019-10-14 06:20 | Read:1443 | Comments:0 | Tags:Featured Publications Internet of Things Security technology

Managed Detection and Response analytics report, H1 2019

 Download full report (PDF) Introduction This report contains the results of the Managed Detection and Response (MDR) service (brand name – Kaspersky Managed Protection). The MDR service provides managed threat hunting and initial incident response. Threat hunting is the practice of iteratively searching through data collected from sensors (refere
Publish At:2019-10-08 06:20 | Read:2741 | Comments:0 | Tags:Featured Publications Antivirus Technologies Industrial thre

Tools

Tag Cloud