Threat landscape for smart buildings

The Kaspersky Industrial Cybersecurity Conference 2019 takes place this week in Sochi, the seventh such conference dedicated to the problems of industrial cybersecurity. Among...

Threats to macOS users

Introduction The belief that there are no threats for the macOS operating system (or at least no serious threats) has been bandied about for decades....

This is what our summer’s like

For the second summer straight, we cover the children’s interests during the period when they have enough leisure to give themselves full time to...

Fully equipped Spying Android RAT from Brazil: BRATA

“BRATA” is a new Android remote access tool malware family. We used this code name based on its description – “Brazilian RAT Android”. It...

Incident Response report 2018

 Download full report (PDF) Introduction This report covers our team’s incident response practices for the year 2018. We have thoroughly analyzed all the service requests, customer...

Spam and phishing in Q2 2019

Quarterly highlights Spam through Google services In the second quarter of 2019, scammers were making active use of cloud-based data storage services such as Google Drive...

Agent 1433: remote attack on Microsoft SQL Server

All over the world companies large and small use Microsoft SQL Server for database management. Highly popular yet insufficiently protected, this DBMS is a...

IT threat evolution Q2 2019

Targeted attacks and malware campaigns More about ShadowHammer In March, we published the results of our investigation into a sophisticated supply-chain attack involving the ASUS Live...

Recent Cloud Atlas activity

Also known as Inception, Cloud Atlas is an actor that has a long history of cyber-espionage operations targeting industries and governmental entities. We first...

DDoS attacks in Q2 2019

News overview The second quarter of 2019 turned out to be richer than the first in terms of high-profile DDoS attacks. True, most of the...

Latest article

Key Takeaways and Top Cybersecurity Predictions for 2026

As the threat landscape keeps shifting, security teams are being asked to do more than react. They are expected to look ahead, connect the...

Trend Micro Apex Central Multiple Vulnerabilities

Trend Micro Apex Central Multiple Vulnerabilities CVE-2025-69258: MsgReceiver.exe LoadLibraryEx RCE (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)MsgReceiver.exe listens on default TCP port 20001 and accepts messages having the following structures://...

[R1] Nessus Agent Versions 11.0.3 and 10.9.3 Fix One Vulnerability

Nessus Agent Versions 11.0.3 and 10.9.3 Fix One Vulnerability Arnie Cabral Wed, 01/07/2026 - 08:47 A vulnerability has been identified in the installation/uninstallation...

GRU-Linked BlueDelta Evolves Credential Harvesting

The analysis cut-off date for this report was September 11, 2025 Executive Summary Between February and September 2025, Recorded Future’s Insikt Group identified...