IT threat evolution Q2 2021

Ferocious Kitten, TunnelSnake, PuzzleMaker and other threat actors, zero-day vulnerabilities, ransomware and banking Trojans – check out our review of Q2 2021. Continue reading IT threat evolution Q2 2021

IT threat evolution in Q2 2021. Mobile statistics

In Q2 2021, we prevented 14,465,672 mobile malware, adware and riskware attacks; 886,105 malicious installation packages were detected, of which 24,604 packages were mobile banking Trojans and 3,623 packages were mobile ransomware Trojans. Continue reading IT threat evolution in Q2 2021. Mobile statistics

Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

In the last hour, I’ve used my phone to take pictures of my teenagers, spy on my dogs while I was out of the house, pay my electric bill and watch a funny video. Then, while buying some new dish towels (yet another use), I used my phone as an identity document without even realizing […]

The post Are Your Employees’ Old Phone Numbers Creating Vulnerabilities? appeared first on Security Intelligence.

Continue reading Are Your Employees’ Old Phone Numbers Creating Vulnerabilities?

IT threat evolution Q1 2021

SolarWinds attacks, MS Exchange vulnerabilities, fake adblocker distributing miner, malware for Apple Silicon platform and other threats in Q1 2021. Continue reading IT threat evolution Q1 2021

IT threat evolution Q1 2021. Mobile statistics

In the first quarter of 2021 we detected 1.45M mobile installation packages, of which 25K packages were related to mobile banking Trojans and 3.6K packages were mobile ransomware Trojans. Continue reading IT threat evolution Q1 2021. Mobile statistics

Social Engineering: How to Keep Security Researchers Safe

Attacking the very people who work on stopping threat actors may seem like a bad idea. But some threat groups do go after people who’ve made a career doing vulnerability research. We’ll take a look at a recent social engineering attack campaign targeted at cyber defense experts. How can you and your employees avoid falling […]

The post Social Engineering: How to Keep Security Researchers Safe appeared first on Security Intelligence.

Continue reading Social Engineering: How to Keep Security Researchers Safe

Financial Cyberthreats in 2020

This research is a continuation of our annual financial threat reports providing an overview of the latest trends and key events across the financial threat landscape. The study covers the common phishing threats, along with Windows and Android-based financial malware. Continue reading Financial Cyberthreats in 2020