Operation ShadowHammer

by GReAT
25 Mar 2019 at 1:01pm
Operation ShadowHammer is a newly discovered supply chain attack that leveraged ASUS Live Update software. While the investigation is still in progress and full results and technical paper will be published during SAS 2019 conference in Singapore, we would like to share some important details abo...

AZORult++: Rewriting history

by Alexander Eremin
22 Mar 2019 at 11:13am
In early March 2019, a number of malicious files detected by our products caught the eye. Although similar to AZORult stealer already known to us, unlike the original malware, they were written not in Delphi, but in C++.

Hacking microcontroller firmware through a USB

by Boris Larin
21 Mar 2019 at 4:00pm
I have given a step-by-step guide on the analysis of embedded firmware, finding vulnerabilities and exploiting them to acquire a firmware dump and to carry out code execution on a USB device.

The fourth horseman: CVE-2019-0797 vulnerability

by Vasily Berdnikov
13 Mar 2019 at 10:00am
In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit a vulnerability in the Microsoft Windows operating system. Further analysis of this event led to us discovering a zero-day vulnerability in win32k.sys.

Spam and phishing in 2018

by Maria Vergelis
12 Mar 2019 at 10:00am
2018 showed that cybercriminals continue to keep a close eye on global events and use them to achieve their goals. We have seen a steady increase in phishing attacks on cryptocurrency-related resources, and expect new scams to appear in 2019.

A predatory tale: Who?s afraid of the thief?

by GReAT
11 Mar 2019 at 10:00am
Predator is a data stealer developed by Russian-speaking individuals. It?s being sold cheaply on Russian forums and has been detected many times in the wild.

Financial Cyberthreats in 2018

by Kaspersky Lab
7 Mar 2019 at 10:00am
The presented report continues the series of Kaspersky Lab reports that provide an overview of how the financial threat landscape has evolved over the years. It covers the common phishing threats that users encounter, along with Windows-based and Android-based financial malware.

Pirate matryoshka

by Anton V. Ivanov
6 Mar 2019 at 10:00am
Cybercriminals are always coming up with new kinds of fraud. In this particular case, they employed a method for delivering malicious content through torrent trackers to install adware on user computers.

Mobile malware evolution 2018

by Victor Chebyshev
5 Mar 2019 at 10:00am
Users of mobile devices in 2018 faced what could be the strongest cybercriminal onslaught ever seen. Over the course of the year, we observed both new mobile device infection techniques and a step-up in the use of tried-and-tested distribution schemes (for example, SMS spam).

How to Attack and Defend a Prosthetic Arm

by Vladimir Dashchenko
26 Feb 2019 at 11:00am
Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm?s positions, etc. And just like other IoT devices, this valuable invention must be checked for vulnerabilities. In our research, we focused on those attack vectors that can be implemente...

powered by dotcombinat


TOP Referrer

TOP Downloads

Mac OSX Widget



spam shirt

Partner Sites