IT threat evolution Q1 2021. Mobile statistics

In the first quarter of 2021 we detected 1.45M mobile installation packages, of which 25K packages were related to mobile banking Trojans and 3.6K packages were mobile ransomware Trojans. Continue reading IT threat evolution Q1 2021. Mobile statistics

IT threat evolution Q1 2021. Non-mobile statistics

In Q1 2021, we blocked more than 2 billion attacks launched from online resources across the globe, detected 77.4M unique malicious and potentially unwanted objects, and recognized 614M unique URLs as malicious. Continue reading IT threat evolution Q1 2021. Non-mobile statistics

Kaspersky Security Bulletin 2020-2021. EU statistics

In the EU, 70% of user computers experienced at least one Malware-class attack, 115,452,157 web attacks and 86,584,675 phishing attempts were blocked. Continue reading Kaspersky Security Bulletin 2020-2021. EU statistics

Financial Cyberthreats in 2020

This research is a continuation of our annual financial threat reports providing an overview of the latest trends and key events across the financial threat landscape. The study covers the common phishing threats, along with Windows and Android-based financial malware. Continue reading Financial Cyberthreats in 2020

Threat landscape for industrial automation systems. Statistics for H2 2020

We continued our observations and identified a number of trends that could, in our opinion, be due to circumstances connected with the pandemic in one way or another, as well as the reaction of governments, organizations and people to these circumstances. Continue reading Threat landscape for industrial automation systems. Statistics for H2 2020

Kaspersky Security Bulletin 2020. Statistics

Kaspersky solutions blocked 666,809,967 attacks launched from online resources in various countries across the world, 173,335,902 unique URLs were recognized as malicious by Web Anti-Virus. Continue reading Kaspersky Security Bulletin 2020. Statistics

Adaptive protection against invisible threats

In fact, in most medium-sized companies’ cybersecurity strategies, even with an endpoint solution, there are likely to still be gaps that can and should be closed. In this article, we look at what those gaps are and how to fill them. Continue reading Adaptive protection against invisible threats