We've discovered a new cyberattack against iOS called Triangulation.
The attack starts with iMessage with a malicious attachment, which, using a number of vulnerabilities in iOS installs spyware. No user action is required.
#IOSTriangulation
I had the honor to mеet H.E. Paul Kagame
@paulkagame
, President of the Republic of Rwanda and discuss an integrated approach to
#cybersecurity
on a government level. I am also proud to announce the opening of our newly relocated office in the capital of
#Rwanda
,
#Kigali
.
We welcome the start of negotiations to resolve the current situation in Ukraine and hope that they will lead to a cessation of hostilities and a compromise. We believe that peaceful dialogue is the only possible instrument for resolving conflicts. War isn’t good for anyone.
I recently completed one of my most amazing trips: we drove by car some 12,000 km from
#Magadan
to
#Moscow
.
OMG, what an experience! I'll show and write plenty about it 👉
We've investigated the Vault 8 report and confirm the certificates in our name are fake. Our customers, private keys and services are safe and unaffected
It's been 10 years after the discovery of the notorious
#Stuxnet
worm that was one of the fire starters on the cyberwarfare scene.
Here is the last talk about this discovery from the man who actually found
#Stuxnet
⇒
No matter how this situation develops, we won’t be doing any more advertising on Twitter this year.
The whole of the planned Twitter advertising budget for 2018 will instead be donated to the
@EFF
. They do a lot to fight censorship online.
Recently we found a suspicious shellcode running in the memory of a system process. We decided to investigate how the shellcode was initially placed into the process and where on the infected system the threat was hidden.
We named this
#malware
#Minas
👉
Just released perhaps the world's most comprehensive research about Asian APT groups’ tactics, techniques and procedures.
A must read for all
#infosec
experts👉
This report is the beginning of the investigation of this sophisticated attack. Today we publish the first results of the analysis, but there is still a lot of work ahead. More details (incl. indicators or compromise and disinfection)
#IOSTriangulation
Like the rest of the world, we are in shock regarding the recent events. The main thing we can do in this situation is provide uninterrupted functioning of our products and services globally.
Thanks to a new technology in our products that is capable of detecting supply-chain attacks, our experts have uncovered what seems to be one of the biggest supply-chain incidents ever.
#ShadowHammer
hits hundreds of thousands of ASUS laptop users:
We've some great news for
#cybersecurity
pros: the tools that our GReAT guys use on a daily basis to keep churning out the best research in the world are now available to all of you, and free at that! 👍
Details ⇒
We've discovered 24 vulns in ZkTeco biometric terminal including remote command injection, arbitrary file read and write, and QR code SQL injection allowing the attackers to enter the protected area under someone else's name (demo included) 👉
Triangulation transmits private information to remote servers: microphone recordings, photos from instant messengers, geolocation and data about a number of other activities
#IOSTriangulation
The spyware managed to infect several dozen iPhones of our employees. Thanks to the measures taken, the company is operating normally, business processes and user data are not affected, and the threat has been neutralized. We continue to protect you, as always
#IOSTriangulation
We’re grateful to our German customers for their continued choice of
@kaspersky
& will continue to protect them from threats no matter the origin.
We call on regulators to make choices on facts not politics.
EN -
What to do when banned without evidence and the right to be heard? Well, we’re securing our rights by taking this to the courts. Why? We’ve done nothing wrong.
#SecurityWithoutBorders
In just 2 years the landscape of the most attacked plarforms changed dramatically. Why? The developers of browsers invested a lot of resources and set up processes to mitigate cyberattacks
#TheSAS2019
We are quite confident that Kaspersky was not the main target of this cyberattack. The coming days will bring more clarity and further details on the worldwide proliferation of the spyware
#IOSTriangulation
We have protected the EU for 20 years working with law enforcement leading to multiple arrests of CYBERCRIMINALS. Based upon today’s decision from the EU Parliament, we are forced to freeze our cooperation with orgs including
@Europol
&
#NoMoreRansom
This is not to be confused with a 90s cellphonу :)
Meet Kaspersky IoT Secure Gateway 100 – the first of a range of cyber-immune products for industrial IoT infrastructure based on
#KasperskyOS
, which is currently heading out to the market.
Details 👉
XZ backdoor story – Initial analysis.
Unlike other supply chain attacks we have seen in Node.js, PyPI, FDroid, and the Linux Kernel that mostly consisted of atomic malicious patches, fake packages and typosquatted package names, this incident was a multi-stage operation that
Researchers urge Apple users to update immediately.
The new zero-click zero-day ForcedEntry flaw affects all things Apple: iPhones, iPads, Macs and Watches. 👉
My first memory from the first years after founding the Kompany was the toughest of all because we really had to put the hours in, aka, bust our asses. So we toiled and slogged, working most weekends, and with hardly ever a vacation ⇒
An illustrative example how fake stories about
@kaspersky
are cooked. Ingredients: politician, pseudo hacker, sensation-seeking journalists, opportunistic media. Yes, we turn to court against De Telegraaf and Mr.Vermeend. Read on:
-55°C (-67 °F)
How does it feel? Not that bad if you're properly dressed.
But the intense cold also brings impossibly out-of-this-world views. You feel the gasps of astonishment at the surrounding vastness, whiteness, awesomeness…
👉
Millions of people recently raced to install
@telegram
. Here are some tips for those looking to keep their privacy locked down while using the messaging app.
#TelegramTips
RESEARCH: at least 20 hotels in LatAm, Europe & Asia targeted in
#cyberattack
. Infecting hotel desks, cybercriminals retain remote access to the devices, steal, resell hotel guests' credit card data. Even data provided to
#OTA
is not safe ⇒
#RevengeHotels
Rumors on darknet say Darkside lost big chunk of their infrastructure, Revil is fiercely backpedaling from gov & public organizations, and underground forums are saying 'no more ransom'.
If true, a good day for the world. Happy Friday friends!
Today is a big day 🎆
We're announcing Kaspersky Threat Attribution Engine - an ultimate tool for a comprehensive code similarity analysis and
#cyberattack
attribution.
Started as an internal tool 3 years ago it demonstrated 100% accuracy ⇒
We publish an in-depth analysis of
#DeathStalker
threat actor's new implant
#PowerPepper
. It's a Windows in-memory PowerShell backdoor that can execute remotely sent shell commands ⇒
Let me stress: there is *no* ban for KL products in the UK. We are in touch with
@NCSC
regarding our Transparency Initiative and I am sure we will find the way to work together