Tag: kaspersky
-
Coruna exploit reveals evolution of Triangulation iOS exploitation framework
Kaspersky found Coruna iOS exploits reuse updated code from the 2023 Operation Triangulation attacks, suggesting a possible link. Kaspersky researchers discovered that the Coruna iOS exploit kit uses an updated version of the same kernel exploit seen in the 2023 Operation Triangulation campaign. While early evidence didn’t clearly link the two, the code similarities now…
-
Free Antivirus Software Face-Off: Which One Protects Best in 2026?
Find the best free antivirus software of 2026. Compare Bitdefender, Avira, Kaspersky more for features, speed, and real-time defense. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/products/best-free-antivirus-software/
-
Fake government and Starlink apps used in malware campaign targeting Brazil
The malware, dubbed BeatBanker by Russian cybersecurity firm Kaspersky, infects smartphones through fake applications that mimic legitimate services, including the Starlink satellite internet app and the Brazilian government portal INSS Reembolso. First seen on therecord.media Jump to article: therecord.media/fake-gov-apps-malware-android-brazil
-
Critical ExifTool Vulnerability Allows Malicious Images to Execute Code on macOS
Many users believe macOS is inherently resistant to malware, but a newly discovered vulnerability proves otherwise. Kaspersky’s Global Research and Analysis Team (GReAT) recently uncovered a critical flaw, tracked as CVE-2026-3102, within ExifTool. ExifTool is a widely popular open-source application and library for extracting and editing file metadata. If a macOS user processes a specially…
-
Analyse von Kaspersky – Hunderte Angriffe mit Millionen kompromittierter Accounts
First seen on security-insider.de Jump to article: www.security-insider.de/ransomware-angriffe-zunahme-deutschsprachige-laender-a-af039703172ecfcd376dc3413f972934/
-
14 old software bugs that took way too long to squash
Tags: access, api, attack, authentication, automation, bug-bounty, communications, computer, control, credentials, cve, cvss, cyber, data, data-breach, dns, dos, encryption, exploit, flaw, hacker, Hardware, infosec, infrastructure, Internet, kaspersky, linux, malicious, malware, microsoft, mitigation, network, nist, open-source, password, programming, remote-code-execution, risk, service, software, stuxnet, supply-chain, technology, theft, threat, tool, update, usa, vulnerability, windows, zero-dayAge: 30 yearsDate introduced: 1995Date fixed: February 2026Researchers unearthed a legacy flaw in the widely used libpng open-source library that had existed since the technology was first released more than 30 years ago.The heap buffer overflow vulnerability (CVE-2026-25646) meant that applications using the flawed software would crash when presented with a maliciously constructed PNG raster…
-
14 old software bugs that took way too long to squash
Tags: access, api, attack, authentication, automation, bug-bounty, communications, computer, control, credentials, cve, cvss, cyber, data, data-breach, dns, dos, encryption, exploit, flaw, hacker, Hardware, infosec, infrastructure, Internet, kaspersky, linux, malicious, malware, microsoft, mitigation, network, nist, open-source, password, programming, remote-code-execution, risk, service, software, stuxnet, supply-chain, technology, theft, threat, tool, update, usa, vulnerability, windows, zero-dayAge: 30 yearsDate introduced: 1995Date fixed: February 2026Researchers unearthed a legacy flaw in the widely used libpng open-source library that had existed since the technology was first released more than 30 years ago.The heap buffer overflow vulnerability (CVE-2026-25646) meant that applications using the flawed software would crash when presented with a maliciously constructed PNG raster…
-
Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
Follows suggestions iPhone-pwning toolset bears hallmarks of zero-days that targeted Russian diplomats First seen on theregister.com Jump to article: www.theregister.com/2026/03/04/kaspersky_dismisses_claims_that_coruna/
-
Phishing-Kampagne missbraucht Google Tasks für Unternehmenszugänge
Wie das Sicherheitsunternehmen Kaspersky berichtet, missbrauchen Angreifer das Benachrichtigungssystem von Google Tasks, um an Zugangsdaten von Unternehmensaccounts zu gelangen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/phishing-google-tasks
-
Deutschsprachiger Entwickler hinter Arkanix-Stealer?
Ein neuer Infostealer namens Arkanix wurde öffentlich über Discord beworben und im Malware-as-a-Service-Modell angeboten. Experten von Kaspersky haben die Spuren eines deutschsprachigen Entwicklers gefunden. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/infostealer-arkanix
-
New backdoor found in Android tablets targeting users in Russia, Germany and Japan
In a report released this week, Russian cybersecurity firm Kaspersky said it uncovered a previously undocumented backdoor dubbed Keenadu that is built directly into a device’s core software, allowing it to load into every application launched on the tablet. First seen on therecord.media Jump to article: therecord.media/new-backdoor-found-in-android-russia-japan-brazil
-
Keenadu: Android malware that comes preinstalled and can’t be removed by users
Embedded in core system apps: Keenadu can control legitimate system applications on affected devices. Kaspersky observed it inside critical components such as face unlock applications, raising the possibility that attackers could access biometric data. The malware was also found operating within the home screen app that controls the device’s primary interface.The researchers warned that the…
-
Keenadu backdoor found preinstalled on Android devices, powers Ad fraud campaign
Kaspersky uncovered Keenadu, an Android backdoor used for ad fraud that can even take full control of devices. Kaspersky has identified a new Android malware called Keenadu. It can be preinstalled in device firmware, hidden inside system apps, or even distributed via official stores like Google Play. Currently used for ad fraud by turning infected…
-
Firmware-level Android backdoor found on tablets from multiple manufacturers
A new Android backdoor embedded directly in device firmware can quietly take control of apps and harvest data, Kaspersky researchers found. The malware, named Keenadu, was … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/17/firmware-level-android-backdoor-keenadu-tablets/
-
Kaspersky-Warnung vor Cyberbetrug rund um den Valentinstag: Betrüger ködern mit vermeintlichen Geschenkkarten
Tags: kasperskyFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/kaspersky-warnung-cyberbetrug-valentinstag-koeder-geschenkkarten
-
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign
The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as NetSupport RAT.Cybersecurity vendor Kaspersky is tracking the activity under the moniker Stan Ghouls. The threat actor is known to be active since at least 2023, orchestrating spear-phishing attacks…
-
Ransomware-Angriffe in der DACH-Region steigen deutlich
Die Bedrohung durch Ransomware wächst weiter. Kaspersky registrierte 2025 in Deutschland 384 Angriffe ein deutlicher Anstieg im Vergleich zu 233 im Jahr 2024. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ransomware-dach-region
-
IT-Sicherheit: Kaspersky droht BSI mit rechtlichen Schritten
Seit 2022 warnt das BSI vor Kaspersky. Nun fordert das Unternehmen die Rücknahme und droht mit einem Rechtsstreit. First seen on golem.de Jump to article: www.golem.de/news/it-sicherheit-kaspersky-droht-bsi-mit-klage-in-millionenhoehe-2602-204920.html
-
IT-Sicherheit: Kaspersky droht BSI mit Klage in Millionenhöhe
Seit 2022 warnt das BSI vor Kaspersky. Nun fordert das Unternehmen die Rücknahme und droht mit einer massiven Schadenersatzklage. First seen on golem.de Jump to article: www.golem.de/news/it-sicherheit-kaspersky-droht-bsi-mit-klage-in-millionenhoehe-2602-204920.html
-
Kaspersky Security Bulletin – Täglich 500.000 neue Bedrohungen, hauptsächlich für Windows-Nutzer
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-report-2025-spyware-password-theft-increase-a-660ef79836761e78488632c9aeb17357/
-
Kaspersky Security Bulletin – Täglich 500.000 neue Bedrohungen, hauptsächlich für Windows-Nutzer
First seen on security-insider.de Jump to article: www.security-insider.de/cybersecurity-report-2025-spyware-password-theft-increase-a-660ef79836761e78488632c9aeb17357/
-
OpenAI für Scam-Mails missbraucht
Cyberkriminelle entwickeln ihre Methoden stetig weiter und nutzen dabei zunehmend Funktionen vertrauenswürdiger Plattformen aus. Aktuelle Analysen des Sicherheitsunternehmens Kaspersky zeigen, dass Einladungsfunktionen der OpenAI Plattform missbraucht werden, um betrügerische E Mails zu verbreiten. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/openai-scam-mails-missbraucht
-
Grey-Swan-Risiken: Kaspersky skizziert acht plausible Szenarien mit potenziell hohem Cyberrisiko
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/grey-swan-risiken-kaspersky-skizze-acht-plausible-szenarien-potenzial-hoch-cyberrisiko
-
Grauer Schwan: Acht plausible Szenarien mit potenziell hohem Cyberrisiko
Durch die immer stärkere Vernetzung digitaler Systeme und ihrer zunehmenden Abhängigkeit von unsichtbaren technischen Grundlagen entstehen neue Kategorien von Cyberrisiken jenseits klassischer Malware. Unterschiedliche Arten von Ransomware und Störungen könnten zu einem Verlust der universellen Zeitreferenz, einem extremen Solarereignis oder auch zu cybergestützten Umweltschäden führen. In einer aktuellen, zukunftsgerichteten Analyse hat Kaspersky sogenannte »Grey-Swan«-Szenarien untersucht:……
-
Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
The legendary Careto threat actor, also known as >>The Mask,
-
Evasive Panda cyberespionage campaign uses DNS poisoning to install MgBot backdoor
China-linked APT Evasive Panda used DNS poisoning to deliver the MgBot backdoor in targeted cyber-espionage attacks in Türkiye, China, and India. Kaspersky researchers spotted the China-linked APT group Evasive Panda (aka Daggerfly, Bronze Highland, and StormBamboo) running a targeted cyber-espionage campaign using DNS poisoning to deliver the MgBot backdoor against victims in Türkiye, China, and…
-
Quishing: Kaspersky meldet signifikante Zunahme des QR-Code-Phishings
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/quishing-kaspersky-signifikant-zunahme-qr-code-phishing
-
Quishing: Kaspersky meldet signifikante Zunahme des QR-Code-Phishings
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/quishing-kaspersky-signifikant-zunahme-qr-code-phishing
-
Frogblight Malware Targets Android Users With Fake Court and Aid Apps
Kaspersky warns of ‘Frogblight,’ a new Android malware draining bank accounts in Turkiye. Learn how this ‘court case’ scam steals your data and how to stay safe. First seen on hackread.com Jump to article: hackread.com/frogblight-malware-android-fake-court-aid-apps/

