18.8 C
London
Sunday, August 20, 2017
Home Tags Arsenal

Tag: Arsenal

IT threat evolution Q2 2017

The threat from ransomware continues to grow.

Between April 2016 and March 2017, we blocked ransomware on the computers of 2,581,026 Kaspersky Lab customers.
In May, we saw the biggest ransomware epidemic in history, called WannaCry.
Malware gangs add mouse-hover downloads to their arsenal of social engineering tricks to infect PCs.
Developers on the Android mobile platform, which has had ongoing problems with security, now have at their disposal an API intended to protect apps from malicious traffic and bots.Google is adding a Recaptcha API to Google Play Services for Android apps. The API is included with Google SafetyNet, a set of services and APIs to protect against threats that include device tampering and potentially harmful apps.[ Chatbots should be part of your intelligent systems arsenal: Build chat bots with Microsoft's Bot Framework • Cortana moves way beyond being a personal assistant. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ]Critical to the API is Google’s latest Recaptcha technology, which provides behind-the-scenes risk analysis and has let actual people pass through with no clicks. With Android apps updated to support the new API, mobile users can use their apps without being interrupted yet still avoid spam and abuse.To read this article in full or to leave a comment, please click here
Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations in over 80 countries.

During the first quarter of 2017, there were 33 private reports released to subscribers of our Intelligence Services, with IOC data and YARA rules to assist in forensics and malware-hunting.
New botnet squadrons wage fiercer, more intense attacks on unsecured IoT devices.
How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Using our own telemetry data and intelligence reports as well as publicly available information, we’ve looked at the top vulnerabilities and applications exploited by attackers.
New York’s Montgomery County, located at the foot of the Adirondacks, consists of 10 towns, one city and 50,000 residents.

To protect the data that pertains to its citizens and operations, Montgomery County added DatAdvantage from Varonis to its arsenal of security wares.

The data security platform is designed to show organizations where sensitive data exists, who is accessing it, and how to keep it safe.To read this article in full or to leave a comment, please click here(Insider Story)
The latest dump of hacks and exploits target most versions of the operating system.
Each DDoS (distributed denial-of-service) attack seem to be larger than the last, and recent advisories from Akamai and Ixia indicate that attackers are stepping up their game.

As attackers expand their arsenal of reflection methods to target CLDAP ...
Researchers who track nation-state groups say open-source hacking tools increasingly are becoming part of the APT attack arsenal.
The Lamberts is a family of sophisticated attack tools that has been used by one or multiple threat actors against high-profile victims since at least 2008.

The arsenal includes network-driven backdoors, several generations of modular backdoors, harvesting tools, and wipers.
Annoyed with the U.S. missile strike last week on an airfield in Syria, among other things, hacker group Shadow Brokers resurfaced on Saturday and released what they said was the password to files containing suspected National Security Agency tools they had earlier tried to sell.“Is appearing you are abandoning ‘your base’, ‘the movement’, and the peoples who getting you elected,” the group wrote in broken English in a letter to U.S. President Donald Trump posted online on Saturday.[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]The hacker group, believed by some security experts to have Russian links, released in January an arsenal of tools that appeared designed to spy on Windows systems, after trying to to sell these and other supposedly Windows and Unix hacking tools for bitcoin.To read this article in full or to leave a comment, please click here