/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@kaspersky

@kaspersky
24 posts
2024-06-21
[image]
2024-06-21 View on X
Reuters

The US' restrictions on Kaspersky will stop US sales of its antivirus tool from July 20 and bar software updates and resales for US customers from September 29

The Biden administration on Thursday announced plans to bar the sale of antivirus software made by Russia's Kaspersky Lab in the United States …

2023-06-23
Today we share the details about the sinister payload deployed in the attack - a treacherous spyware implant branded as TriangleDB https://kas.pr/4qx4 !!!
2023-06-23 View on X
BleepingComputer

Apple patches three zero-days in macOS, iOS, iPadOS, and watchOS, exploited by the Triangulation iMessage spyware reported by Kaspersky earlier in June 2023

https://www.macrumors.com/... Twitter: Daniel Monastersky / @identidadrobada : Apple fixes software flaws behind hacks that Russia blamed on the United States - The Washington Post...

2023-06-22
Today we share the details about the sinister payload deployed in the attack - a treacherous spyware implant branded as TriangleDB https://kas.pr/4qx4 !!!
2023-06-22 View on X
BleepingComputer

Apple patches three zero-days in macOS, iOS, iPadOS, and watchOS, exploited by the Triangulation iMessage spyware reported by Kaspersky earlier in June 2023

Apple addressed three new zero-day vulnerabilities exploited in attacks installing Triangulation spyware on iPhones via iMessage zero-click exploits.

2023-06-02
We've discovered a new cyberattack against iOS devices called Triangulation. The attack starts with an zero-click #iMessage with a malicious attachment which, using a number of vulnerabilities in iOS, installs spyware. #IOSTriangulation Full story 👇 https://securelist.com/...
2023-06-02 View on X
The Record

The FSB claims Apple helped the NSA hack Russian diplomats' iPhones; Kaspersky: unknown malware leveraged zero-click exploits on iPhones running up to iOS 15.7

Russia's Federal Security Service (FSB) is accusing U.S. intelligence of hacking “thousands of Apple phones” to spy on Russian diplomats.

2023-04-12
Our latest report revealed that #cybercriminals use #Darknet to sell malicious Google Play #apps for up to US$20,000😱💲 #GooglePlay threats⚠️ explained👇 https://kas.pr/yj4n
2023-04-12 View on X
BleepingComputer

Kaspersky: malware developers are selling malicious Google Play loaders for $2K-$20K on hacker forums; the average price for a loader is $6,975

Malware developers have created a thriving market promising to add malicious Android apps to Google Play for $2,000 to $20,000 …

In 2022, We detected 1,661,743 malware or unwanted software installers, targeting mobile users. With many examples of malicious and unwanted apps on Google Play being discovered after complaints from users, we decided to take a look!!👇 https://kas.pr/5w4t
2023-04-12 View on X
BleepingComputer

Kaspersky: malware developers are selling malicious Google Play loaders for $2K-$20K on hacker forums; the average price for a loader is $6,975

Malware developers have created a thriving market promising to add malicious Android apps to Google Play for $2,000 to $20,000 …

Elevation-of-privilege exploits on #MicrosoftWindows!! While the majority of zero-days that we've discovered were used by APTs, this group using the CVE-2023-28252 zero-day, attempted to deploy the #Nokoyawaransomware! Read the full article➡️ https://kas.pr/c6o6 https://twitter.com/...
2023-04-12 View on X
BleepingComputer

Microsoft releases 97 security fixes, patching one actively exploited zero-day flaw in the Windows Common Log File System and seven critical RCE vulnerabilities

Today is Microsoft's April 2023 Patch Tuesday, and security updates fix one actively exploited zero-day vulnerability and a total of 97 flaws.

2023-01-31
What can $4K get you on the #darkweb? Quite a bit, including a #ReverseEngineer. See what else we found analyzing the dark web job market 👉 https://kas.pr/qo7o https://twitter.com/...
2023-01-31 View on X
CyberScoop

Kaspersky: from January 2020 to June 2022, hacker groups offered salaries from six figures to $1.2M, bonuses, and paid leave to attract talent on the dark web

Despite the obvious risks, tech jobs with hacking groups can be alluring for those who need the money or want to do the work.

2022-08-28
Early in 2022, we detected activity from the #Kimsuky hacking group targeting entities in South Korea. In its latest attack, the #APT actor initiated the infection chain by sending a spear-phishing email containing a macro-embedded Word doc. Know more 👉 https://kas.pr/p9sv https://twitter.com/...
2022-08-28 View on X
BleepingComputer

Kaspersky details how the North Korean Kimsuky threat actors use a multi-stage validation scheme to ensure their malware is only downloaded by specific targets

Friday, Aug 26, 2022 // (IG): BB //Sponsor: ShadowNews Tweets: @arekfurt : Neat. Kaspersky managed to grab some of North Korean Kimsuky group's server side target validation script...

2022-08-27
Early in 2022, we detected activity from the #Kimsuky hacking group targeting entities in South Korea. In its latest attack, the #APT actor initiated the infection chain by sending a spear-phishing email containing a macro-embedded Word doc. Know more 👉 https://kas.pr/p9sv https://twitter.com/...
2022-08-27 View on X
BleepingComputer

Kaspersky details how the North Korean APT Kimsuky is using a multi-stage validation scheme to ensure their malware is only downloaded by specific targets

The North Korean ‘Kimsuky’ threat actors are going to great lengths to ensure that their malicious payloads are only downloaded … Source: Securelist .

2021-06-18
Is the Clop raid a big win in the war against #ransomware, or is it just another instance of whack-a-mole? Full @threatpost story 👇 https://threatpost.com/...
2021-06-18 View on X
Financial Times

Ukrainian police arrest members of ransomware gang Clop, the first time that a national law enforcement agency has carried out mass arrests of such a gang

Arrests of Cl0p hacker group members adds to pressure on other countries to follow suit  —  Ukrainian police have arrested members …

2021-06-10
Kaspersky tech recently detected a wave of targeted attacks against businesses. Closer inspection revealed these attacks exploited a chain of Google #Chrome & #Microsoft 0-day exploits. These have now been patched in the latest round of #PatchTuesday. https://securelist.com/...
2021-06-10 View on X
BleepingComputer

In its June batch of patches, Microsoft announced fixes for 50 flaws, including seven zero-days, six of which have been exploited in the wild

Lawrence Abrams / BleepingComputer :

2021-04-14
While analyzing the CVE-2021-1732 exploit used by the BITTER APT group, our researchers discovered another zero-day that is believed to be linked to the same group. Here's what we know 👇 https://securelist.com/...
2021-04-14 View on X
BleepingComputer

In its April batch of patches, Microsoft fixes 108 flaws, including 19 “critical” flaws, five 0-days, and four NSA-discovered critical Exchange flaws

Today is Microsoft's April 2021 Patch Tuesday, and with it comes five zero-day vulnerabilities and more Critical Microsoft Exchange vulnerabilities.

While analyzing the CVE-2021-1732 exploit used by the BITTER APT group, our researchers discovered another zero-day that is believed to be linked to the same group. Here's what we know 👇 https://securelist.com/...
2021-04-14 View on X
VICE

The DOJ says the FBI performed a court-approved operation to “copy and remove malicious web shells” on hundreds of hacked Exchange servers across the US

The FBI obtained court approval to access vulnerable computers across the United States.  —  Joseph Cox

2020-12-20
While the #SolarWinds Orion IT packages reached about 18,000 customers, only a handful of these was interesting to the attackers referred to as UNC2452 or DarkHalo. @craiu and @2igosha share new findings on @Securelist. https://kas.pr/k75e https://twitter.com/...
2020-12-20 View on X
Wired

Experts say the SolarWinds hack shows that the US still has no good answers to combat “supply chain” attacks, which are “ridiculously difficult” to detect

Despite years of warning, the US still has no good answer for the sort of “supply chain” attack that let Russia run wild.

While the #SolarWinds Orion IT packages reached about 18,000 customers, only a handful of these was interesting to the attackers referred to as UNC2452 or DarkHalo. @craiu and @2igosha share new findings on @Securelist. https://kas.pr/k75e https://twitter.com/...
2020-12-20 View on X
Reuters

An analysis of publicly available web records shows SolarWinds hackers accessed the networks at Cox Communications and the local government in Pima County, AZ

including the highest reaches of the U.S. government — is certain of exactly what the hackers had infiltrated, let alone the full extent of what was taken. https://www.bloomberg.co...

2020-12-19
While the #SolarWinds Orion IT packages reached about 18,000 customers, only a handful of these was interesting to the attackers referred to as UNC2452 or DarkHalo. @craiu and @2igosha share new findings on @Securelist. https://kas.pr/k75e https://twitter.com/...
2020-12-19 View on X
Reuters

An analysis of publicly available web records shows SolarWinds hackers accessed the networks at Cox Communications and the local government in Pima County, AZ

LONDON (Reuters) - Suspected Russian hackers accessed the systems of a U.S. internet provider and a county government in Arizona …

2020-07-07
Some smartphone suppliers are trying to maximize profits by pre-installing adware on the devices. https://kas.pr/n7v7 Unfortunately for users, pre-installed adware is often impossible to remove without risking damage to the system. https://twitter.com/...
2020-07-07 View on X
Threatpost

Researchers say that 14.8% of Android users targeted with malware or adware last year were left with an infected system partition, making removal difficult

A healthy percentage of Android users targeted by mobile malware or mobile adware last year suffered a system partition infection … Tweets: @kaspersky and @campuscodi Tweets: @kasp...

2020-01-24
One in ten of our Mac OS users have encountered the Shlayer Trojan. This unassuming malware is now one of the most common types of malicious software attacking the Mac OS platform. Read the full story here: https://kas.pr/98ai https://twitter.com/...
2020-01-24 View on X
Threatpost

Kaspersky Lab: in 2019, ~30% of all macOS malware detections derived from the Shlayer trojan, an unsophisticated malware that spreads via fake app installs

The malvertising-focused trojan known as Shlayer has burbled to the top of the malware heap when it comes to targeting Mac users.

2019-11-03
Recently, we caught a new unknown #0day exploit for #Google's Chrome browser CVE-2019-13720. Since our discovery, Google has released a Chrome update for Windows, Mac and Linux users. More details on Operation WizardOpium attacks below. https://securelist.com/...
2019-11-03 View on X
The Hacker News

Google releases patch for a Chrome zero-day vulnerability being used in the wild that allows hackers to escape sandbox protections via malicious websites

Attention readers, if you are using Chrome on your Windows, Mac, and Linux computers, you need to update your web browsing software immediately …