Recent News around IT, Security and Communications

Every week QED Systems prepare a list of most important IT News on technology topics, including operating systems, software, security, mobile, storage and Internet, emerging tech, and technology companies such as Microsoft, Google and Apple

Wed, Mar 28, 2018
Your new friend, KLara
In R&D we use a lot of open-source projects and we believe giving back to the community is our way of saying ‘Thank you’. More and more s...
Kaspersky Lab ICS CERT publishes the findings of its research on the threat landscape for industrial automation systems conducted during ...
There are three ways of doing things in the malware business: the right way, the wrong way and the way Brazilians do it. From the early b...
At last year’s Security Analyst Summit 2017 we predicted that medical networks would be a titbit for cybercriminals. Unfortunately, we we...
The researchers at Kaspersky Lab ICS CERT decided to check the popular smart camera to see how well protected it is against cyber abuses....
Fri, Mar 09, 2018
The Slingshot APT FAQ
While analyzing some memory dumps suspicious of being infected with a keylogger, we identified a library containing strings to interact w...
Fri, Mar 09, 2018
Masha and these Bears
Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a prolific, well resourced, and persistent adversary. They are sometimes portr...
In our previous blog , we detailed our findings about the attack against the Pyeongchang 2018 WinterOlympics. For this investigation, our...
Mon, Mar 05, 2018
Mining is the new black
Last year we published a story revealing the rise of miners across the globe. At the time we had discovered botnets earning millions of U...
Wed, Feb 28, 2018
Financial Cyberthreats in 2017
This report summarizes a series of Kaspersky Lab reports that between them provide an overview of how the financial threat landscape has ...
This time, we’ve chosen a smart hub designed to control sensors and devices installed at home. It can be used for different purposes, suc...
Every year, vast numbers of people around the globe relish the delightful prospect of filling out tax returns, applying for tax refunds, ...
In 2017, we encountered lots of samples that were ‘exploiting’ the implementation of Microsoft Word’s RTF parser to confuse all other thi...
Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a highly active and prolific APT. From their high volume 0day deployment to th...
Thu, Feb 15, 2018
Spam and phishing in 2017
The share of spam in email traffic in 2017 fell by 1.68% to 56.63%. The lowest share (52.67%) was recorded in December 2017. The highest ...
Of all the forms of attack against financial institutions around the world, the one that brings traditional crime and cybercrime together...
In October 2017, we learned of a vulnerability in Telegram Messenger’s Windows client that was being exploited in the wild. It involves t...
At first, it looked like we’d found a zero-day local privilege escalation vulnerability for Windows, but the sample that was triggering E...
A search online lead me to a discovery I didn’t think was possible nowadays. I realized almost immediately that critical security issues ...
Tue, Feb 06, 2018
DDoS attacks in Q4 2017
Q4 2017 represented something of a lull: both the number and duration of DDoS attacks were down against the previous quarter. At the same...
Another edition of BSides NYC has passed, and as first time attendee and presenter, I was genuinely impressed with the impeccable organiz...
Thu, Feb 01, 2018
Every little bitcoin helps
It often happens that inventions and technologies that start out good end up turning into dangerous tools in the hands of criminals. Bloc...
On Monday, Jan 29th, IRS officially opened its 2018 season. Right after two days of the opening, we got phishing messages with a fake ref...
Thu, Jan 25, 2018
Denis and Co.
In April 2017, we published a detailed review of a malicious program that used DNS tunneling to communicate to its C&C. That study prompt...

If you are an executive looking for a right IT partnership or you just want to make sure you are taking the correct steps in your decisions feel free to drop us a line. We won’t muddy the waters with tons of biz-speak. But we will bring you a serious return on investment.

Contact QED Systems    or   
Request a Free Quote

QED Systems partners with global leaders in network security and application technologies.