Tag: kaspersky
-
Ransomware-Angriffe in der DACH-Region steigen deutlich
Die Bedrohung durch Ransomware wächst weiter. Kaspersky registrierte 2025 in Deutschland 384 Angriffe ein deutlicher Anstieg im Vergleich zu 233 im Jahr 2024. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ransomware-dach-region
-
IT-Sicherheit: Kaspersky droht BSI mit rechtlichen Schritten
Seit 2022 warnt das BSI vor Kaspersky. Nun fordert das Unternehmen die Rücknahme und droht mit einem Rechtsstreit. First seen on golem.de Jump to article: www.golem.de/news/it-sicherheit-kaspersky-droht-bsi-mit-klage-in-millionenhoehe-2602-204920.html
-
IT-Sicherheit: Kaspersky droht BSI mit Klage in Millionenhöhe
Seit 2022 warnt das BSI vor Kaspersky. Nun fordert das Unternehmen die Rücknahme und droht mit einer massiven Schadenersatzklage. First seen on golem.de Jump to article: www.golem.de/news/it-sicherheit-kaspersky-droht-bsi-mit-klage-in-millionenhoehe-2602-204920.html
-
Kaspersky Security Bulletin – Täglich 500.000 neue Bedrohungen, hauptsächlich für Windows-Nutzer
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-report-2025-spyware-password-theft-increase-a-660ef79836761e78488632c9aeb17357/
-
Kaspersky Security Bulletin – Täglich 500.000 neue Bedrohungen, hauptsächlich für Windows-Nutzer
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-report-2025-spyware-password-theft-increase-a-660ef79836761e78488632c9aeb17357/
-
OpenAI für Scam-Mails missbraucht
Cyberkriminelle entwickeln ihre Methoden stetig weiter und nutzen dabei zunehmend Funktionen vertrauenswürdiger Plattformen aus. Aktuelle Analysen des Sicherheitsunternehmens Kaspersky zeigen, dass Einladungsfunktionen der OpenAI Plattform missbraucht werden, um betrügerische E Mails zu verbreiten. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/openai-scam-mails-missbraucht
-
Grey-Swan-Risiken: Kaspersky skizziert acht plausible Szenarien mit potenziell hohem Cyberrisiko
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/grey-swan-risiken-kaspersky-skizze-acht-plausible-szenarien-potenzial-hoch-cyberrisiko
-
Grauer Schwan: Acht plausible Szenarien mit potenziell hohem Cyberrisiko
Durch die immer stärkere Vernetzung digitaler Systeme und ihrer zunehmenden Abhängigkeit von unsichtbaren technischen Grundlagen entstehen neue Kategorien von Cyberrisiken jenseits klassischer Malware. Unterschiedliche Arten von Ransomware und Störungen könnten zu einem Verlust der universellen Zeitreferenz, einem extremen Solarereignis oder auch zu cybergestützten Umweltschäden führen. In einer aktuellen, zukunftsgerichteten Analyse hat Kaspersky sogenannte »Grey-Swan«-Szenarien untersucht:……
-
Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
The legendary Careto threat actor, also known as >>The Mask,
-
Evasive Panda cyberespionage campaign uses DNS poisoning to install MgBot backdoor
China-linked APT Evasive Panda used DNS poisoning to deliver the MgBot backdoor in targeted cyber-espionage attacks in Türkiye, China, and India. Kaspersky researchers spotted the China-linked APT group Evasive Panda (aka Daggerfly, Bronze Highland, and StormBamboo) running a targeted cyber-espionage campaign using DNS poisoning to deliver the MgBot backdoor against victims in Türkiye, China, and…
-
Quishing: Kaspersky meldet signifikante Zunahme des QR-Code-Phishings
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/quishing-kaspersky-signifikant-zunahme-qr-code-phishing
-
Quishing: Kaspersky meldet signifikante Zunahme des QR-Code-Phishings
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/quishing-kaspersky-signifikant-zunahme-qr-code-phishing
-
Frogblight Malware Targets Android Users With Fake Court and Aid Apps
Kaspersky warns of ‘Frogblight,’ a new Android malware draining bank accounts in Turkiye. Learn how this ‘court case’ scam steals your data and how to stay safe. First seen on hackread.com Jump to article: hackread.com/frogblight-malware-android-fake-court-aid-apps/
-
Neue Funktionen für Container und Hybrid – Kaspersky stärkt Cloud-Schutz
First seen on security-insider.de Jump to article: www.security-insider.de/kaspersky-aktualisiert-container-hybrid-cloud-security-a-4a3de3d4c925d32a359576af99e822bb/
-
Kaspersky-Report – Zweifeln, Zögern, Zaudern Das ist der Cybersecurity-Alltag von KMU
First seen on security-insider.de Jump to article: www.security-insider.de/cybersicherheit-in-kmu-strategien-vs-realitaet-a-5653ebd6f50ca1443ca8ec3d5acc7656/
-
Black Friday 2026: Kaspersky meldet 146.500 Spam-Mails mit Rabatt-Bezug seit Anfang November
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/black-friday-2025-kaspersky-meldung-146200-spam-mails-rabatt-november
-
Neues ToddyCat-Toolkit greift Outlook und Microsoft-Token an
Tags: access, apt, backdoor, browser, chrome, cloud, cyberattack, exploit, governance, government, Internet, kaspersky, mail, microsoft, open-source, powershell, tool, update, vulnerability, windowsDie APT-Gruppe ToddyCat hat ihren Fokus auf den Diebstahl von Outlook-E-Mail-Daten und Microsoft 365-Zugriffstoken verlagert.Forscher von Kaspersky Labs haben festgestellt, dass sich die APT-Gruppe (Advanced Persistent Threat) ToddyCat jetzt darauf spezialisiert hat, Outlook-E-Mail-Daten und Microsoft 365-Zugriffstoken zu stehlen.Demnachhat die Hackerbande ihr Toolkit Ende 2024 und Anfang 2025 weiterentwickelt, um nicht nur wie bisher Browser-Anmeldedaten zu…
-
ToddyCat APT evolves to target Outlook archives and Microsoft 365 tokens
Outlook in the Crosshairs: Another evolution involves accessing actual mail data. ToddyCat deployed a tool named TCSectorCopya C++ utility that opens the disk as a read-only device and copies Outlook’s offline storage files (OST) sector by sector, bypassing any file-lock mechanisms that Outlook may enforce.Once OST files are extracted, they are fed into XstReader, an…
-
ToddyCat APT evolves to target Outlook archives and Microsoft 365 tokens
Outlook in the Crosshairs: Another evolution involves accessing actual mail data. ToddyCat deployed a tool named TCSectorCopya C++ utility that opens the disk as a read-only device and copies Outlook’s offline storage files (OST) sector by sector, bypassing any file-lock mechanisms that Outlook may enforce.Once OST files are extracted, they are fed into XstReader, an…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
ToddyCat APT Targeting Internal Employee Communications at Organizations
Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable evolution in their operational capabilities. Recent research from Kaspersky reveals how this highly organized espionage group has refined methods for covertly accessing internal employee communications at target organizations throughout the second half of 2024 and…
-
Tsundere Botnet Targets Windows, Linux macOS via Node.js Packages
A Russian-speaking threat actor attributed to the username >>koneko
-
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows users.Active since mid-2025, the threat is designed to execute arbitrary JavaScript code retrieved from a command-and-control (C2) server, Kaspersky researcher Lisandro Ubiedo said in an analysis published today.There are currently no details on how the botnet malware is propagated; First seen…
-
Overcome the myriad challenges of password management to bolster data protection
Tags: access, attack, authentication, automation, backup, best-practice, breach, business, cio, cloud, compliance, control, cyberattack, data, data-breach, gartner, GDPR, identity, infrastructure, international, kaspersky, mfa, password, risk, software, technology, tool, update[1]And both enterprises and small and mid-sized businesses have already made significant investments in authentication, access controls and identity and access management (IAM).[2]But these investments are not effective without robust passwords. At the same time, password management is a cost for IT and security teams, and an inconvenience for technology users.The scale of the problem…
-
Kaspersky findet kritische Mängel in Telematik-Ökosystemen – Zero-Day-Schwachstelle in vernetzten Fahrzeugen entdeckt
First seen on security-insider.de Jump to article: www.security-insider.de/kaspersky-audit-schwachstellen-fahrzeug-telematiksystemen-a-2049d8a2d3abb023ec6562514d3f9bfb/

