IT threat evolution in Q2 2021. PC statistics
PC threat statistics for Q2 2021 contain data on miners, encrypting ransomware, financial malware and threats to Windows, macOS and IoT. Continue reading IT threat evolution in Q2 2021. PC statistics
Collaborate Disseminate
PC threat statistics for Q2 2021 contain data on miners, encrypting ransomware, financial malware and threats to Windows, macOS and IoT. Continue reading IT threat evolution in Q2 2021. PC statistics
Last year, we took a look at how the pandemic influenced the threat landscape for gamers and the gaming industry. One year later, online gamers are even more active, and cybercriminals continue to exploit this. Continue reading Do cybercriminals play cyber games in quarantine? A look one year later
Dan Demeter, Senior Security Researcher with Kaspersky’s Global Research and Analysis Team and head of Kaspersky’s Honeypot project, explains what honeypots are, why they’re recommended for catching external threats, and how you can set up your own simple SSH-honeypot. Continue reading Detecting unknown threats: a honeypot how-to
In this report we try to understand what occupied children during the last year, from May 2020 to April 2021 inclusive. Continue reading Kids on the Web in 2021: Infinite creativity
In Q1 2021, we blocked more than 2 billion attacks launched from online resources across the globe, detected 77.4M unique malicious and potentially unwanted objects, and recognized 614M unique URLs as malicious. Continue reading IT threat evolution Q1 2021. Non-mobile statistics
In the EU, 70% of user computers experienced at least one Malware-class attack, 115,452,157 web attacks and 86,584,675 phishing attempts were blocked. Continue reading Kaspersky Security Bulletin 2020-2021. EU statistics
In Q1 2021, we saw a spike in DDoS activity in January, peaking at over 1,800 attacks per day. The most widespread was UDP flooding (41.87%), while SYN flooding dropped to third place (26.36%). Continue reading DDoS attacks in Q1 2021
In this article we discuss browser lockers that mimic law enforcement websites. Continue reading Browser lockers: extortion disguised as a fine
On the anniversary of the global shutdown, we decided to take a look back at how the threat landscape has evolved since the beginning of the pandemic — and what that means for users in the years to come. Continue reading COVID-19: Examining the threat landscape a year later
News overview Cybercriminals are constantly on the lookout for means and methods to make attacks more destructive. In Q4 2020, Citrix ADC (application delivery controller) devices became one such tool, when perpetrators abused their DTLS interface. The DTLS (Datagram Transport Layer Security) protocol is used to establish secure connections over UDP, through which most DNS queries, Continue reading DDoS attacks in Q4 2020