Tag: Browser
-
Exploits and vulnerabilities in Q1 2024
The report provides vulnerability and exploit statistics, key trends, and analysis of interesting vulnerabilities discovered in Q1 …
-
IT threat evolution in Q1 2023. Non-mobile statistics
PC malware statistics for the Q1 2023 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT …
-
Uncommon infection and malware propagation methods
In this report, Kaspersky researchers discuss uncommon infection and propagation methods observed in certain crimeware …
-
Threat in your browser: what dangers innocent-looking extensions hold for users
In this research, we observed various types of threats that mimic useful web browser extensions, and the number of users attacked by …
-
IT threat evolution Q2 2021
Ferocious Kitten, TunnelSnake, PuzzleMaker and other threat actors, zero-day vulnerabilities, ransomware and banking Trojans – check out …
-
LuminousMoth APT: Sweeping attacks for the chosen few
We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. …
-
PuzzleMaker attacks with Chrome zero-day exploit chain
We detected a wave of highly targeted attacks against multiple companies. Closer analysis revealed that all these attacks exploited a chain …
-
Magnitude exploit kit – evolution
Exploit kits still play a role in today’s threat landscape and continue to evolve. For this blogpost I studied and analyzed the evolution …
-
Unwanted notifications in browser
When, back in 2015, push notifications were just appearing in browsers, very few people wondered how this tool would be used in the …
-
COMpfun successor Reductor infects files on the fly to compromise TLS traffic
In April 2019, we discovered new malware that compromises encrypted web communications in an impressive way. We called these new modules …
-
How dodgy browser plugins, web scripts can silently rewrite that URL you were about to hit – and throw you into an internet wormhole
Analysis Clickjacking, which came to the attention of security types more than a decade ago, continues to thrive, despite defenses deployed …
-
How to steal a million (of your data)
This cybercriminal’s thirst for stolen data is confirmed by the statistics: in the first half of 2019, more than 940,000 users were …
●●●