Category: SECURELIST

  • The state of stalkerware in 2020

    The 2020 data shows that the stalkerware situation has not improved much: the number of affected people is still high. A total of 53,870 …

  • Lazarus targets defense industry with ThreatNeedle

    In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware …

  • DDoS attacks in Q4 2020

    News overview Cybercriminals are constantly on the lookout for means and methods to make attacks more destructive. In Q4 2020, Citrix ADC …

  • Spam and phishing in 2020

    COVID-19 spam, corporate phishing, fake videoconferences and other trends and figures of …

  • How kids coped with COVID-hit winter holidays

    We analyzed and categorized the most popular websites and search queries over the festive period (December 20, 2020 — January 10, 2021) …

  • Privacy predictions for 2021

    With privacy more often than not being traded for convenience, we believe that for many 2020 has fundamentally changed how much privacy …

  • Sunburst backdoor – code overlaps with Kazuar

    While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. …

  • Digital Footprint Intelligence Report

    The Digital Footprint Intelligence Service announces the results of research on the digital footprints of governmental, financial and …

  • How we protect our users against the Sunburst backdoor

    The detection logic has been improved in all our solutions to ensure our customers protection. We continue to investigate cyberattack on …

  • Lazarus covets COVID-19-related intelligence

    As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found …

  • Sunburst: connecting the dots in the DNS requests

    We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for …

  • The future of cyberconflicts

    Cyberspace conflicts can take a vast number of forms, but in the context of this article, we will only focus on two of them: cyber-warfare …