Nhash: petty pranks with big finances

According to our data, cryptocurrency miners are rapidly gaining in popularity. In an earlier publication we noted that cybercriminals were making use of social...

Travle aka PYLOT backdoor hits Russian-speaking targets

.travle-big-table td{border:1px solid #eee!important}.travle-big-table td{padding: 10px;} At the end of September, Palo Alto released a report on Unit42 activity where they – among other things...

Jack of all trades

Nowadays, it’s all too easy to end up with malicious apps on your smartphone, even if you’re using the official Google Play app store....

Kaspersky Security Bulletin. Overall statistics for 2017

All the statistics used in this report were obtained using Kaspersky Security Network (KSN), a distributed antivirus network that works with various anti-malware protection components....

Still Stealing

Two years ago in October 2015 we published a blogpost about a popular malware that was being distributed from the Google Play Store. Over...

Cybercriminals vs financial institutions in 2018: what to expect

ul li {margin-bottom:2.4rem;} Introduction – key events in 2017 2017 was a year of great changes in the world of cyberthreats facing financial organizations. Firstly, in 2017...

Kaspersky Security Bulletin: Review of the Year 2017

ul li {margin-bottom:2.4rem;} Introduction The end of the year is a good time to take stock of the main cyberthreat incidents that took place over the...

Kaspersky Security Bulletin: Story of the year 2017

 Download the Kaspersky Security Bulletin: Story of the year 2017 Introduction: what we learned in 2017 In 2017, the ransomware threat suddenly and spectacularly evolved. Three...

IoT lottery: finding a perfectly secure connected device

Black Friday and Cyber Monday are great for shopping. Vendors flood the market with all kinds of goods, including lots of exciting connected devices...

Five Reasons CISOs Should Keep an Open Mind About Cryptocurrencies

Far from a dying breed, cryptocurrencies are not only evolving but being accepted in countless new markets. CISOs need to know the ins and...

Latest article

Metasploit Wrap-Up 04/03/2026

Additional Adapters and More ModulesThis week, we added a whole new bunch of HTTP/HTTPS-based CMD payloads for X64 and X86 versions of Windows. The...

Android Alert: 50 Google Play Apps Linked to ‘NoVoice’ Malware Reached 2.3M Downloads

NoVoice malware was found in 50 Android apps on Google Play, with 2.3 million downloads, by bypassing detection and targeting outdated devices. The post Android...

How AWS KMS and AWS Encryption SDK overcome symmetric encryption bounds

If you run high-scale applications that encrypt large volumes of data, you might be concerned about tracking encryption limits and rotating keys....