
Igor Kuznetsov
Contributor at Daily Telegraph NZ
Articles
-
1 month ago |
securelist.com | Igor Kuznetsov |Boris Larin |Kaspersky GERT |Kaspersky Security
In mid-March 2025, Kaspersky technologies detected a wave of infections by previously unknown and highly sophisticated malware. In all cases, infection occurred immediately after the victim clicked on a link in a phishing email, and the attackers’ website was opened using the Google Chrome web browser. No further action was required to become infected. All malicious links were personalized and had a very short lifespan.
-
Dec 9, 2024 |
securelist.com | Alexander Liskin |Vladimir Kuskov |Igor Kuznetsov |Vitaly Kamluk
A faulty update by cybersecurity firm CrowdStrike triggered one of the largest IT outages in history, impacting approximately 8.5 million systems worldwide. This incident serves as a stark reminder of the critical risks posed by global IT disruptions and supply chain weaknesses.
-
Nov 28, 2024 |
securelist.com | Igor Kuznetsov |Giampaolo Dedola |Georgy Kucherin |Maher Yamout
Kaspersky’s Global Research and Analysis Team (GReAT) has been releasing quarterly summaries of advanced persistent threat (APT) activity for over seven years now. Based on our threat intelligence research, these summaries offer a representative overview of what we’ve published and discussed in more detail in our private APT reports. They are intended to highlight the significant events and findings that we think are important for people to know about.
-
Nov 25, 2024 |
securelist.com | Igor Kuznetsov |Giampaolo Dedola |Georgy Kucherin |Maher Yamout
We at Kaspersky’s Global Research and Analysis Team monitor over 900 APT (advanced persistent threat) groups and operations. At the end of each year, we take a step back to assess the most complex and sophisticated attacks that have shaped the threat landscape. These insights enable us to anticipate emerging trends and build a clearer picture of what the APT landscape may look like in the year ahead.
-
Oct 29, 2024 |
securelist.com | Victor Sergeev |Ahmed Khlief |Igor Kuznetsov |Amged Wageh
IntroductionOrganizations often rely on a layered defense strategy, yet breaches still occur, slipping past multiple levels of protection unnoticed. This is where compromise assessment enters the game. The primary objective of these services is risk reduction.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →