Industrial cybersecurity threat landscape

Expansion of the Internet makes ICS easier prey to attackers. The number of ICS components available over the Internet increases every year. Taking into account that initially many ICS solutions and protocols were designed for isolated environments, such availability often provides a malicious user with multiple capabilities to cause impact to the infrastructure behind the ICS due to lack of security controls. Continue reading Industrial cybersecurity threat landscape

KSN Report: Mobile ransomware in 2014-2016

The number of users attacked with ransomware is huge. But how big is it? Ransomware seems to be a global threat. But maybe there are regions at a higher risk of danger? There seem to be a lot of ransomware malware groups. But what are the most widespread and dangerous? Continue reading KSN Report: Mobile ransomware in 2014-2016

KSN Report: Ransomware from 2014-2016

The number of users attacked with ransomware is huge. But how big is it? Ransomware seems to be a global threat. But maybe there are regions at a higher risk of danger? There seem to be a lot of ransomware malware groups. But what are the most widespread and dangerous? Continue reading KSN Report: Ransomware from 2014-2016

IT threats during the 2016 Olympic Games in Brazil

Olympic threats designed to trick you Are you planning to visit Brazil during the Olympic Games? Or watch it online? In this blog post we discuss the threats to visitors aiming to travel to Brazil to watch the games and… Read Full Article Continue reading IT threats during the 2016 Olympic Games in Brazil

CVE-2015-2545: overview of current threats

Cyberespionage attacks conducted by different groups across the Asia-Pacific (APAC) and Far East regions share one common feature: in order to infect their victims with malware, the attackers use an exploit for the CVE-2015-2545 vulnerability. Continue reading CVE-2015-2545: overview of current threats

Malware and non-malware ways for ATM jackpotting. Extended cut

Millions of people around the world now use ATMs every day to withdraw cash, pay in to their account or make a variety of payments. Unfortunately, ATM manufacturers and their primary customers – banks – don’t pay much attention to the security of cash machines. Continue reading Malware and non-malware ways for ATM jackpotting. Extended cut

Attack on Zygote: a new twist in the evolution of mobile threats

Applications that gain root access to a mobile device without the user’s knowledge can provide access to much more advanced and dangerous malware, in particular, to Triada, the most sophisticated mobile Trojans we know. Continue reading Attack on Zygote: a new twist in the evolution of mobile threats