Igor Golovin's profile photo

Igor Golovin

Featured in: Favicon mdpi.com

Articles

  • Aug 14, 2024 | securelist.com | Dmitry Kalinin |Tatyana Shishkova |Igor Golovin |Roman Dedenok

    In late July 2024, we detected a series of ongoing targeted cyberattacks on dozens of computers at Russian government organizations and IT companies. The threat actors infected devices using phishing emails with malicious shortcut attachments. These shortcuts were used to deliver malware that received commands via the Dropbox cloud service.

  • Aug 13, 2024 | securelist.com | Tatyana Shishkova |Igor Golovin |Roman Dedenok |Roman Nazarov

    For over six years now, Kaspersky’s Global Research and Analysis Team (GReAT) has been sharing quarterly updates on advanced persistent threats (APTs). These summaries draw on our threat intelligence research, offering a representative overview of what we’ve published and discussed in more detail in our private APT reports. They’re designed to highlight the key events and findings that we think people should know about.

  • Aug 12, 2024 | securelist.com | Vladislav Tushkanov |Tatyana Shishkova |Igor Golovin |Roman Dedenok

    What is prompt injection? Large language models (LLMs) – the neural network algorithms that underpin ChatGPT and other popular chatbots – are becoming ever more powerful and inexpensive. For this reason, third-party applications that make use of them are also mushrooming, from systems for document search and analysis to assistants for academic writing, recruitment and even threat research. But LLMs also bring new challenges in terms of cybersecurity.

  • Aug 5, 2024 | securelist.com | Dmitry Kalinin |Tatyana Shishkova |Igor Golovin |Roman Dedenok

    In March 2024, we discovered a campaign targeting individuals in Russia with previously unseen Android spyware we dubbed LianSpy. Our analysis indicates that the malware has been active since July 2021. This threat is equipped to capture screencasts, exfiltrate user files, and harvest call logs and app lists. The malicious actor behind LianSpy employs multiple evasive tactics, such as leveraging a Russian cloud service, Yandex Disk, for C2 communications.

  • Aug 1, 2024 | securelist.com | Tatyana Shishkova |Igor Golovin |Roman Dedenok |Roman Nazarov

    IntroductionCybercriminals who specialize in ransomware do not always create it themselves. They have many other ways to get their hands on ransomware samples: buying a sample on the dark web, affiliating with other groups or finding a (leaked) ransomware variant. This requires no extraordinary effort, as source code is often leaked or published.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →