Source Link Introduction When the war in Ukraine broke out, many analysts were surprised…
Mobile Security
-
-
Mobile SecuritySecurity
MITRE ATT@CK v11 adds ICS matrix, sub-techniques for mobile threats
by Chris Hughesby Chris HughesSource Link The MITRE Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) Framework has become…
-
Source Link The use of embedded HTML documents in phishing e-mails is a standard…
-
Source Link Ahead of the Anti-Ransomware Day, we summarized the tendencies that characterize ransomware…
-
Mobile SecuritySecurity
The Trojan subscribers Joker, MobOk, Vesub and GriftHorse
by Igor Golovinby Igor GolovinSource Link Billing fraud is one of the most common sources of income for…
-
Source Link In February 2022 we observed the technique of putting the shellcode into…
-
Source Link For five years, the Global Research and Analysis Team (GReAT) at Kaspersky…
-
Source Link News overview The DDoS landscape in Q1 2022 was shaped by the…
-
Source Link Yanluowang is a type of targeted ransomware discovered by the Symantec Threat…
-
Source Link Yanluowang is a type of targeted ransomware discovered by the Symantec Threat…