Home Tags Malicious

Tag: malicious

In 2017, Kaspersky Labrsquo;s web antivirus detected 15 714 700 unique malicious objects (scripts, exploits, executable files, etc.) and 199 455 606 unique URLs were recognized as malicious by web antivirus components. Kaspersky Lab solutions detected and repelled 1 188 728 338 malicious attacks launched from online resources located in 206 countries all over the world.
London - Dec. 12, 2017 - Malicious mobile apps are back on the rise, impersonating brands and fooling consumers, according to digital threat management leader RiskIQ, in its Q3 mobile threat landscape report, which analysed 120 mobile app stores and mo...

Still Stealing

Two years ago we published a blogpost about a popular malware that was being distributed from the Google Play Store.
In October and November 2017 we found 85 new malicious apps on Google Play that are stealing credentials for VK.com
Researcher finds logger, turned off by default, could be turned on with a registry change.
An Android vulnerability called Janus allows attackers to inject malicious code into signed Android apps.
Google gives Administrators new ways to lock down the browser.
During past few years, the number and quality of attacks aimed financial sector organizations has continuously grown.

The financial institutions that have not already thought about cyber security, will soon face the consequences of hacker attacks.
Users with injected software are 15 percent more likely to experience crashes.
Multiple vulnerabilities exist in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) and WebEx Recording Format (WRF) files.

A remote attacker could exploit these vulnerabilities by providing a user with a malicious ARF or WRF...
A vulnerability in Cisco WebEx Meeting Center could allow an authenticated, remote attacker to initiate connections to arbitrary hosts. The vulnerability is due to insufficient access control for HTTP traffic directed to the Cisco WebEx Meeting Ce...
A vulnerability in Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system. The vulnerability is due to insufficient input validation of some pa...
A vulnerability in Cisco WebEx Network Recording Player for WebEx Recording Format (WRF) files could allow an attacker to cause a denial of service (DoS) condition.

An attacker could exploit this vulnerability by providing a user with a malicious W...