This bug is a fascinating lesson in how adding restrictions with the aim of improving security may paradoxically end up reducing it. Source: Sophos
This bug is a fascinating lesson in how adding restrictions with the aim of improving security may paradoxically end up reducing it. Source: Sophos
Download the full report (PDF) All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components. The data was collected from KSN users who agreed to provide it. Millions of Kaspersky Lab product users from 213 countries and territories worldwide participate […]
Download the full report (PDF) Targeted attacks and malware campaigns Cha-ching! Skimming off the cream Earlier in the year, as part of an incident response investigation, we uncovered a new version of the Skimer ATM malware. The malware, which first surfaced in 2009, has been re-designed. So too have the tactics of the cybercriminals using […]
Malefactors continue to expand the features of ransomware as they try to extract maximum benefit from the compromise of infected computers. We recently found an interesting example of such an “upgrade”: a new logic in the latest version of the Shade encryptor currently being spread widely within the territories of Russia and CIS. On the […]
Download the full report (PDF) Technical analysis Indicators of compromise (IOC)Download YARA rules More information about ProjectSauron is available to customers of Kaspersky Intelligence Reporting Service. Contact: [email protected] Introduction: Over the last few years, the number of “APT-related” incidents described in the media has grown significantly. For many of these, though, the designation “APT”, indicating an “Advanced […]