Introduction In a recent incident response case in Brazil, we spotted intriguing new antivirus (AV) killer…
Category: News
Efimer Trojan delivered via email and hacked WordPress websites
Introduction In June, we encountered a mass mailing campaign impersonating lawyers from a major company. These…
Phishing and scams: how fraudsters are deceiving users in 2025
Introduction Phishing and scams are dynamic types of online fraud that primarily target individuals, with cybercriminals…
PipeMagic in 2025: How the backdoor operators’ tactics have changed
In April 2025, Microsoft patched 121 vulnerabilities in its products. According to the company, only one…
Gh0st RAT-based GodRAT attacks financial organizations
Summary In September 2024, we detected malicious activity targeting financial (trading and brokerage) firms through the…
Modern vehicle cybersecurity trends
Modern vehicles are transforming into full-fledged digital devices that offer a multitude of features, from common…
The new SparkKitty Trojan spy in the App Store and Google Play
{{if ext==”ipa”}} {{else}} {{/if}} <div class=“t-name”> <div class=“tit”> {{if ext==“ipa”}} <i class=“iconfont icon-iphone” style=“font-size:inherit;margin-right:5px”></i> {{else}} <i…
Kaspersky 2025 SMB threat report
Cyberattackers often view small and medium-sized businesses (SMBs) as easier targets, assuming their security measures are…
How the Batavia spyware targeting Russian organizations works
Introduction Since early March 2025, our systems have recorded an increase in detections of similar files…
Deconstructing RACF in z/OS and uncovering security issues
In our previous article we dissected penetration testing techniques for IBM z/OS mainframes protected by the…