Plato Data Intelligence.
Vertical Search & Ai.

Tag: Kaspersky

Ducktail Malware Targets the Fashion Industry

Ducktail is targeting marketing professionals in the fashion industry with its latest campaign, where the threat actors send out archives containing images of authentic...

Apocalypse Metaverse Game Exposed as Trojan by SlowMist

The security firm SlowMist has unmasked a hidden danger within the Apocalypse Metaverse game. This discovery has sent ripples through the Web3 space, cautioning...

Canada Bans WeChat, Kaspersky on Government Devices

Penka Hristovska Published on: November 3, 2023 The Canadian government has banned the instant messaging service WeChat and...

Spyware Designed for Telegram Mods Also Targets WhatsApp Add-Ons

Kaspersky researchers have discovered that attackers are distributing spyware that stealthily gathers private data from users of WhatsApp on Android devices, through the same...

Upgraded Kazuar Backdoor Offers Stealthy Power

An enhanced iteration of Kazuar, a relatively obscure but "highly functional" backdoor Trojan, has boosted its capabilities to be more challenging to detect, and...

Meet Rhysida, a New Ransomware Strain That Deletes Itself

Operating since last May, an emerging ransomware strain called Rhysida was deployed along with new stealer malware called Lumar for a potent new one-two...

Kaspersky Launches Specialized Security Solution for Containerized Environments

Woburn, MA – October 16, 2023 — Kaspersky today announces the launch of a full-featured solution for containerized environments, Kaspersky Container Security (KCS). This solution offers secure...

Brands Beware: X’s New Badge System Is a Ripe Cyber-Target

Fraudsters are taking advantage of the new verification system implemented by X, formerly known as Twitter, in order to impersonate brands and steal personal...

The Cyberwar Between the East and the West Goes Through Africa

Nation-state hackers are a potent weapon in the hands of countries. The days a war starts by someone pulling a trigger are gone: It...

Can open-source software be secure?

Secure Coding, Business Security Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary...

Stealth Falcon preying over Middle Eastern skies with Deadglyph

For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent threats (APTs). In the midst of routine monitoring...

Mysterious ‘Sandman’ APT Targets Telecom Sector With Novel Backdoor

Telecom companies can add one more sophisticated adversary to the already long list of advanced persistent threat (APT) actors they need to protect their...

Latest Intelligence

spot_img
spot_img
spot_img