Frequent verification codes may appear for non-Mainland China IP visits. If visitors are severely affected, please send [IP|ASN](|AS14618) to the bottom mailbox to add to the whitelist


2023-02-10 18:00   Good, Perfect, Best: how the analyst can enhance penetration testing results    #Kaspersky #安全文章 What is the analyst on a penetration testing team, what role they perform at Kaspersky, and why is their job vital to the success of the project?

2023-02-07 16:00   Web beacons on websites and in e-mail    #Kaspersky #安全文章 Explaining web beacons (web bugs, spy or tracking pixels), what companies use these on websites and in e-mail, how and why.

2023-01-31 16:00   Prilex modification now targeting contactless credit card transactions    #Kaspersky #安全文章 Kaspersky discovers three new variants of the Prilex PoS malware capable of blocking contactless NFC transactions on an infected device.

2023-01-30 18:00   Come to the dark side: hunting IT professionals on the dark web    #Kaspersky #安全文章 We have analyzed more than 800 IT job ads and resumes on the dark web. Here is what the dark web job market looks like.

2023-01-23 18:00   What your SOC will be facing in 2023    #Kaspersky #安全文章 Supply chain and reoccurring attacks, data destruction, lack of staff — what challenges will your security operations center be facing in 2023?

2023-01-19 18:00   Roaming Mantis implements new DNS changer in its malicious mobile app in 2022    #Kaspersky #安全文章 Roaming Mantis (a.k.a Shaoye) is a long-term cyberattack campaign that uses malicious Android package (APK) files to control infected Android devices and steal data. In 2022, we observed a DNS changer function implemented in its Android malware Wroba.o.

2023-01-18 16:00   What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks    #Kaspersky #安全文章 Kaspersky’s predictions about the threats to corporations in 2023: media blackmail, fake leaks, cloud attacks, and more advanced ransomware.

2023-01-09 18:38   How much security is enough?    #Kaspersky #安全文章 A common perception in the infosec community is that there can never be too much security, but it is understood that "too much" security is expensive — and sometimes, prohibitively so — from a business perspective. So, where is that fine line that defines "just enough" security?

2022-12-27 16:00   BlueNoroff introduces new methods bypassing MoTW    #Kaspersky #安全文章 We continue to track the BlueNoroff group’s activities and this October we observed the adoption of new malware strains in its arsenal.

2022-12-22 16:00   Ransomware and wiper signed with stolen certificates    #Kaspersky #安全文章 In this report, we compare the ROADSWEEP ransomware and ZEROCLEARE wiper versions used in two waves of attacks against Albanian government organizations.

2022-12-20 00:15   CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange    #Kaspersky #安全文章 At the end of September, GTSC reported the finding of two 0-day vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082. The cybersecurity community dubbed the pair of vulnerabilities ProxyNotShell.

2022-12-14 18:00   Reassessing cyberwarfare. Lessons learned in 2022    #Kaspersky #安全文章 In this report, we propose to go over the various activities that were observed in cyberspace in relation to the conflict in Ukraine, understand their meaning in the context of the current conflict, and study their impact on the cybersecurity field as a whole.

2022-12-09 21:00   How to train your Ghidra    #Kaspersky #安全文章 Brief introduction to setting up Ghidra, and then configuring it with a familiar UI and shortcuts, so that you would not need to re-learn all the key sequences you have got used to over the years.

2022-12-08 18:00   DeathStalker targets legal entities with new Janicab variant    #Kaspersky #安全文章 While hunting for less common Deathstalker intrusions, we identified a new Janicab variant used in targeting legal entities in the Middle East throughout 2020.

2022-12-06 18:00   Main phishing and scamming trends and techniques    #Kaspersky #安全文章 Phishing in social networks and messengers, marketplace fraud, exploitation of Google Forms and other services: we uncover what’s trending among attackers in 2022