IT threat evolution Q2 2022

IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022. Mobile statistics Targeted attacks New technique for installing fileless malware Earlier this year, we discovered a malicious campaign that employed a new technique for installing fileless malware on target machines by injecting a shellcode directly […]

Continue Reading

The State of Stalkerware in 2021

 The state of stalkerware in 2021 (PDF) Main findings of 2021 Every year Kaspersky analyzes the use of stalkerware around the world to better understand the threat it poses. We partner with stakeholders across public and private sectors to raise awareness and find solutions to best tackle this important issue. Stalkerware enables people to secretly […]

Continue Reading

Comment éviter d’être espionné par un AirTag | Blog officiel de Kaspersky

L’AirTag d’Apple n’est commercialisé que depuis le printemps dernier mais il a déjà acquis une mauvaise réputation puisqu’il faciliterait l’activité des criminels et permettrait de suivre les personnes sans leur accord. Dans cet article, nous analysons de plus près le fonctionnement de l’AirTag et déterminons quels sont les dangers. Nous vous expliquons aussi comment vous […]

Continue Reading

FTC Bans Stalkerware Company SpyFone | Avast

The US Federal Trade Commission (FTC) recently announced a ban on the stalkerware company SpyFone and ordered them to delete all of the data they had illegally harvested from victims. Additionally, they banned the company’s CEO, Scott Zuckerman, from working in the surveillance industry ever again and ordered the company to notify everyone who had […]

Continue Reading

IT threat evolution Q1 2021

Targeted attacks Putting the ‘A’ into APT In December, SolarWinds, a well-known IT managed services provider, fell victim to a sophisticated supply-chain attack. The company’s Orion IT, a solution for monitoring and managing customers’ IT infrastructure, was compromised by threat actors. This resulted in the deployment of a custom backdoor, named Sunburst, on the networks […]

Continue Reading