How Kaspersky researchers obtained all stages of the Operation Triangulation campaign targeting iPhones and iPads, including zero-day exploits, validators, TriangleDB implant and additional modules. This article has been indexed from Securelist Read the original article: How to catch a wild…
Tag: Securelist
Overview of IoT threats in 2023
IoT threats: how devices get hacked, what malware is uploaded, and what services are on offer on the dark web in 2023. This article has been indexed from Securelist Read the original article: Overview of IoT threats in 2023
Threat landscape for industrial automation systems. Statistics for H1 2023
In the first half of 2023, the percentage of ICS computers on which malicious objects were blocked decreased from H2 2022 by just 0.3 pp to 34%. This article has been indexed from Securelist Read the original article: Threat landscape…
Free Download Manager backdoored – a possible supply chain attack on Linux machines
Kaspersky researchers analyzed a Linux backdoor disguised as Free Download Manager software that remained under the radar for at least three years. This article has been indexed from Securelist Read the original article: Free Download Manager backdoored – a possible…
From Caribbean shores to your devices: analyzing Cuba ransomware
The article analyzes the malicious tactics, techniques and procedures (TTP) used by the operator of the Cuba ransomware, and details a Cuba attack incident. This article has been indexed from Securelist Read the original article: From Caribbean shores to your…
Evil Telegram doppelganger attacks Chinese users
Spyware Telegram mod in Uighur and Chinese spreads through Google Play stealing messages and other user data. This article has been indexed from Securelist Read the original article: Evil Telegram doppelganger attacks Chinese users