KmsdBot, a new evasive bot for cryptomining activity and DDoS attacks
Researchers spotted a new evasive malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak credentials....
Researchers spotted a new evasive malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak credentials....
Russian threat actors employed a new ransomware family called Somnia in attacks against multiple organizations in Ukraine. The Government Computer...
Are the directors of a company hit by a cyberattack liable for negligence in failing to take steps to limit...
Ukraine’s Cyber Police and Europol arrested 5 Ukrainian citizens who are members of a large-scale transnational fraud group. Ukraine’s cyber...
The Lockbit 3.0 ransomware gang started leaking the information allegedly stolen from the global high-tech company Thales. Thales is a...
Crypto exchange FTX appears to have been hacked, rumors state that attackers stole $600 million drained from the company’s wallets....
Experts discovered two new malicious dropper apps on the Google Play Store distributing the Xenomorph banking malware. Zscaler ThreatLabz researchers...
Sobeys, the second-largest supermarket chain in Canada, was he victim of a ransomware attack conducted by the Black Basta gang....
An initial access broker claims to have hacked Deutsche Bank and is offering access to its systems for sale on...
This blog entry details our investigation of CVE-2019-8561, a vulnerability that exists in the macOS PackageKit framework, a component used...
Lookout researchers discovered two long-running surveillance campaigns targeting the ethnic minority Uyghurs. Researchers from mobile security firm Lookout uncovered two...
The U.S. DoJ charged a Russian-Canadian national for his alleged role in LockBit ransomware attacks against organizations worldwide. The U.S. Department of...
Google fixed a high-severity security bug affecting all Pixel smartphones that can allow attackers to unlock the devices. Google has...
Microsoft linked Prestige ransomware attacks against organizations in Ukraine and Poland to Russia-linked threat actors. In Mid-October, Microsoft Threat Intelligence...
Cryptocurrency prices were dropping from the end of 2021 and throughout the first half of 2022. Although finance experts and...
Apple released out-of-band patches for iOS and macOS to fix a couple of code execution vulnerabilities in the libxml2 library....
Experts discovered a malicious package on the Python Package Index (PyPI) that uses steganographic to hide malware within image files....
A flaw in the ABB Totalflow system used in oil and gas organizations could be exploited by an attacker to...
Russia-linked APT29 cyberespionage group exploited a Windows feature called Credential Roaming to target a European diplomatic entity. Mandiant researchers in...
Lenovo fixed two high-severity flaws impacting various laptop models that could allow an attacker to deactivate UEFI Secure Boot. Lenovo...
Knowing what the future holds can help with being prepared for emerging threats better. Every year, Kaspersky experts prepare forecasts...
Discover the four main types of cyber crime groups: access as a service, ransomware as a service, bulletproof hosting, and...
We looked into the campaigns deployed by a new subgroup of advanced persistent threat (APT) group APT41, Earth Longzhi. This...
Google Project Zero researchers reported that a surveillance vendor is using three Samsung phone zero-day exploits. Google Project Zero disclosed...