Remove 2022 Remove Phishing Remove Spyware
article thumbnail

Threat landscape for industrial automation systems for H1 2022

SecureList

H1 2022 in numbers. In H1 2022, malicious objects were blocked at least once on 31.8% Percentage of ICS computers on which malicious objects were blocked, January – June 2020, 2021, and 2022. 15 countries and territories with the highest percentage of ICS computers on which malicious objects were blocked, H1 2022.

Spyware 126
article thumbnail

IT threat evolution Q1 2022

SecureList

IT threat evolution in Q1 2022. IT threat evolution in Q1 2022. IT threat evolution in Q1 2022. The group uses various malware families, including Wroba, and attack methods that include phishing, mining, smishing and DNS poisoning. Non-mobile statistics. Mobile statistics. Targeted attacks. Other malware.

Phishing 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threats to ICS and industrial enterprises in 2022

SecureList

For instance, we see a new trend emerging in the criminal ecosystem of spyware-based authentication data theft, with each individual attack being directed at a very small number of targets (from single digits to several dozen). Phishing is the top initial penetration tool for targeted (and not-so-targeted) attacks.

Spyware 138
article thumbnail

Best Internet Security Suites & Software for 2022

eSecurity Planet

Originally developed to detect and remove malware or computer viruses, modern antivirus software can now protect against ransomware, browser attacks, keyloggers, malicious websites, and even sometimes phishing attempts. Also Read: 4 Best Antivirus Software of 2022. Also Read: Best Enterprise VPN Solutions for 2022. Back to top.

Internet 144
article thumbnail

APT trends report Q3 2022

SecureList

This is our latest installment, focusing on activities that we observed during Q3 2022. We can confirm a Maui ransomware incident in 2022, but we would expand their “first seen” date from the reported May 2021 to April 15, 2021, and the geolocation of the target to Japan and India. The most remarkable findings.

Malware 145
article thumbnail

Top Cybersecurity Companies for 2022

eSecurity Planet

They earned the highest score among providers named "Customer's Choice" in Gartner's 2022 "Voice of the Customer” Security Awareness Computer-Based Training report. It needs to be maintained for various types of cyber threats like Ransomware, Malware, Social Engineering, and Phishing. The benefits of cybersecurity software.

article thumbnail

Security Affairs newsletter Round 515 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog GitLab addressed critical auth bypass flaws in CE and EE North Korea-linked APT group ScarCruft spotted using new Android spyware KoSpy Experts warn of a coordinated surge in the exploitation attempts of SSRF vulnerabilities Meta warns of actively exploited (..)

Spyware 73