Tatyana Machneva's profile photo

Tatyana Machneva

Featured in:

Articles

  • Sep 8, 2023 | securelist.com | Igor Golovin |Eduardo Ovalle |Francesco Figurelli |Tatyana Machneva

    A while ago we discovered a bunch of Telegram mods on Google Play with descriptions in traditional Chinese, simplified Chinese and Uighur. The vendor says these are the fastest apps which use a distributed network of data processing centers around the world. What can possibly be wrong with a Telegram mod duly tested by Google Play and available through the official store?

  • Sep 6, 2023 | kaspersky.co.uk | Anna Larkina |Tatyana Machneva |Alanna Titterington

    The once cozy world of social media has been getting feverish in recent years. In the battle for audience attention, fly-by-night social networks come and go (Clubhouse, anyone?), users run back and forth, and governments, as ever, ponder the introduction of regulations. Who’d have thought, for example, that TikTok would be able to displace such monsters as Facebook and Instagram, and also to be banned fully or partially in a host of countries?

  • Sep 5, 2023 | kaspersky.com | Tatyana Machneva |Jeffrey Esposito |Alexey Andreev |Alanna Titterington

    The creators of any website bear the moral and legal responsibility for it during its entire existence. Moreover, few people know that if a corporate web server gets hacked, it’s not only the company and its customers that may suffer; often, a hacked site becomes a platform for launching new cyberattacks, with its owners not even being aware of it. Why websites get hackedA website hack can be part of a larger cyberattack, or a standalone operation.

  • Aug 25, 2023 | securelist.com | Eduardo Ovalle |Francesco Figurelli |Tatyana Machneva |Olga Svistunova

    Lockbit is one of the most prevalent ransomware strains. It comes with an affiliate ransomware-as-a-service (RaaS) program offering up to 80% of the ransom demand to participants, and includes a bug bounty program for those who detect and report vulnerabilities that allow files to be decrypted without paying the ransom. According to the Lockbit owners, the namesake cybercriminal group, there have been bounty payments of up to 50 thousand dollars.

  • Aug 14, 2023 | securelist.lat | Olga Svistunova |Kaspersky ICS CERT |Sergey Lozhkin |Tatyana Machneva

    Los autores de las páginas de phishing buscan crearlas con el mínimo esfuerzo y quieren que, al mismo tiempo, les reporten el mayor lucro posible. Por lo tanto, están deseosos de utilizar diversas herramientas y técnicas para impedir que las detecten y así ahorrarse tiempo y esfuerzo. En particular, los estafadores usan phish-kits o bots de Telegram para automatizar el phishing.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →