Securelist
@Securelist
The resource for Kaspersky experts' technical research, analysis, and thoughts.
You might like
"The equipment they use is unlike what you find in a typical IT environment,” explains Emad Haffar, META’s Head of Tech Experts. “Heavy-duty, industrial machinery is integral to moving cargo and coordinating logistics. If even one of these machines is compromised, it could…
We've written extensively about the Lazarus APT and its BlueNoroff subgroup here at Kaspersky and they're often at the forefront of APT innovation and experimentation. Recently we detected a new Manuscrypt infection on the personal computer of a person living in Russia. This is…
Grandoreiro is a well-known Brazilian banking trojan, which forms part of the Tetrade umbrella has been active since at least 2016. INTERPOL and law enforcement agencies across the globe continue to fight against it, and we're proud to be a big part in that fight, sharing TTPs…
We've written extensively about the Lazarus APT and its BlueNoroff subgroup here at Kaspersky and they're often at the forefront of APT innovation and experimentation. Recently we detected a new Manuscrypt infection on the personal computer of a person living in Russia. This is…
Grandoreiro is a well-known Brazilian banking trojan, which forms part of the Tetrade umbrella has been active since at least 2016. INTERPOL and law enforcement agencies across the globe continue to fight against it, and we're proud to be a big part in that fight, sharing TTPs…
Analysis of new Crypt Ghouls threat group 👻 Last December, we discovered a new group targeting Russian businesses and government agencies with #ransomware. Investigation into this group’s activity suggests a connection between it and other groups which are actively targeting…
We've recently discovered a new Trojan, dubbed Awaken Likho which is targeting Russian government agencies and industrial enterprises Active since 2021, it has recently updated its toolkit and has replaced UltraVNC with MeshAgent, an open-source remote management tool.…
Although not exactly new, criminals are spreading malware through fake websites with popular software such as #uTorrent, Microsoft Office, and Minecraf. They're also looking to spread their malware through #Telegram and #YouTube channels, installing Wazuh SIEM agents on victims’…
For close to 20 years, we've used machine learning to help us automate threat detection, anomaly recognition, as well as enhance the accuracy of malware identification. In our latest article, we look at how we managed to achieve a 25% increase in APT detection via ML. Learn…
Regular readers may recall when we wrote about 'Necro', which we first talked about it way back in 2019. Back then, we discovered a Trojan in CamScanner which had managed to clock up over 100 million downloads on Google Play. Fast-forward to today and the trojan has found its…
-=TWELVE=- is a threat group which is primarily targeting Russian government organizations. They specialize in encrypting and then deleting victims’ data, which suggests that their main goal is to inflict as much damage as possible on endpoints. We look at the evolution of the…
We have discovered a new web shell infection which is targeting a government entity in the Middle East. This is a new variant of a known China Chopper malware & has been attributed to Tropic Trooper group which has been active for over a decade. More ⇒ kas.pr/2aex
HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat 👉 kas.pr/c4gw
In large organizations, you might encounter incredibly old computers based on 1960s technologies. These mainframes are not only unique in their software and hardware architecture but also quite fragile — it's crucial not to disrupt their operation, as it directly impacts business…
Recently we have discovered a well-known #Necro downloader hiding inside a modified #Spotify app: opentip.kaspersky.com/acb7a06803e6de…. It’s similar to the Triada trojan and is capable of downloading and launching arbitrary DEX files. It’s distributed through websites offering Spotify…
🍎 Since the last SAS, we've all been very curious about iOS hacking, so a talk on this topic is a welcome addition to the #TheSAS2024 agenda! ✨ Lars Fröder (@opa334dev) will cover the state of iOS hacking in 2024 and discuss Apple's protections against kernel exploitation—and…
We look at memory corruption vulnerabilities in the open-source projects Suricata and FreeRDP and see what you can do to mitigate them. securelist.com/suricata-freer…
United States Trends
- 1. Clemson 10.5K posts
- 2. Draymond 6,378 posts
- 3. Steph 36.7K posts
- 4. Wemby 15.1K posts
- 5. #SmackDown 46.6K posts
- 6. Zack Ryder 14.2K posts
- 7. Dabo 1,880 posts
- 8. Landry Shamet 5,270 posts
- 9. Brohm 1,462 posts
- 10. Harden 10.6K posts
- 11. #OPLive 2,405 posts
- 12. Matt Cardona 2,623 posts
- 13. Miller Moss N/A
- 14. #CLAWMARK3D 34.1K posts
- 15. Marjorie Taylor Greene 37.6K posts
- 16. #Isles 2,438 posts
- 17. Jaden Bradley N/A
- 18. UCLA 7,565 posts
- 19. Will Richard 4,663 posts
- 20. #BostonBlue 2,535 posts
You might like
-
Virus Bulletin
@virusbtn -
Kaspersky
@kaspersky -
Threat Intelligence
@threatintel -
Joe Security
@joe4security -
Mandiant (part of Google Cloud)
@Mandiant -
Core Impact
@_CoreImpact -
Help Net Security
@helpnetsecurity -
SANS DFIR
@sansforensics -
Eugene Kaspersky
@e_kaspersky -
VirusTotal
@virustotal -
Seongsu Park
@unpacker -
Cisco Talos Intelligence Group
@TalosSecurity -
Bart
@bartblaze -
Trend Micro Research
@TrendMicroRSRCH -
ExecuteMalware
@executemalware
Something went wrong.
Something went wrong.