Skip to main content
Kaspersky logo
Home
Kaspersky Premium
Kaspersky Plus
Kaspersky Standard
Kaspersky Safe Kids
Kaspersky VPN Secure Connection
Kaspersky Password Manager
Kaspersky eSIM Store
Renew Licenсe
Support
Trials & Downloads
Business
KSOS Portal
Trials & Downloads
Renew SMB licenсe
Find a partner
Company Account
Kaspersky TIP
Support
Cloud Console
Product Training & Certification
Partners
Providers for business
Consumer solutions providers
Partnership with distributors
Find a learning center
Kaspersky United Partner Portal
Become a B2B partner
Become a Build partner
Become a B2C partner
Allowlist Program
About us
Get to know us
Transparency
Corporate News
Press center
Expertise Centers
Awards & Recognitions
Top 3 Rankings
Sponsorships
Case Studies
Policy blog
Careers
Contact us
Home
Business
Partners
About us
EN
English
My Account
Americas
América Latina
Brasil
United States
Canada - English
Canada - Français
Africa
Afrique Francophone
Algérie
Maroc
South Africa
Tunisie
Middle East
Middle East (English)
الشرق الأوسط (Arabic)
Western Europe
Belgique & Luxembourg
Danmark
Deutschland & Schweiz
España
France
Italia & Svizzera
Nederland
Norge
Österreich
Portugal
Sverige
Suomi
United Kingdom
Eastern Europe
Česká republika
Magyarország
Polska
România
Srbija
Türkiye
Ελλάδα (Greece)
България (Bulgaria)
Қазақстан - Русский (Kazakhstan - Russian)
Қазақстан - Қазақша (Kazakhstan - Kazakh)
Россия и Белару́сь (Russia & Belarus)
Україна (Ukraine)
Asia & Pacific
Australia
India
Indonesia (Bahasa)
Malaysia - English
Malaysia - Bahasa Melayu
New Zealand
Việt Nam
ไทย (Thailand)
한국 (Korea)
中国 (China)
香港特別行政區 (Hong Kong SAR)
台灣 (Taiwan)
日本語 (Japan)
For all other countries
Global Website
Home
Resource Center
Threats
Pre-emptive Safety
Threats
Definitions
Threats
Get the latest news and information on the different viruses, malware, and online threats that are affecting online users.
Filter by:
Filter by:
Mac
Malware (threats)
Mobile
Spam
Viruses
Web
VIRUSES
Subcategory Viruses
Bash Bug (Shell Shock) Linux Virus Threat
The "bash bug,” also known as the Shellshock...
Read More
VIRUSES
Subcategory Viruses
Information Technology Security Reports: Figures, Statistics, and Trending Data
Kaspersky Lab Information Technology (IT)...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
The Rise of Ransomware – Most Glaring Examples from 2015-2016:
Ransomware: It's the stuff of nightmares: You...
Read More
VIRUSES
Subcategory Viruses
Svchost.exe Virus Sneak Attacks
The svchost.exe file is commonly used by many...
Read More
VIRUSES
Subcategory Viruses
Kaspersky Unmasks "Icefog" Cyberattacks
These assaults target specific information, such...
Read More
VIRUSES
Subcategory Viruses
Spam Statistics Report Q3-2013
This 2013 Quarterly Spam Statistics Report...
Read More
WEB
Subcategory Web
Major Celebrity Hacks and How They Can Affect You
Last year news of celebrity hacks seemed to be...
Read More
What are web threats?
What are web threats aka online threats? These...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Crouching Yeti (Energetic Bear) Malware
Crouching Yeti is a threat involved in several...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Bash Bug | OS X, UNIX , Linux, Virus Threat
The Bash Bug virus poses a serious threat,...
Read More
WEB
Subcategory Web
Identity Theft: Facts and FAQ
Identity theft is on the rise. How are attackers...
Read More
VIRUSES
Subcategory Viruses
Online shopping safety risks and how to protect yourself
Online shopping is convenient, easy and quick. We...
Read More
Support for Spammers
Trojan proxy-servers – and multipurpose Trojan...
Read More
WEB
Subcategory Web
Spam Statistics Reports: Figures, Sources, and Trending Data
When it comes to cybersecurity, there are few...
Read More
VIRUSES
Subcategory Viruses
Privacy Exposure Online…what’s the worst that could happen?
First there was the leak of a million classified...
Read More
VIRUSES
Subcategory Viruses
Information Technology Security (IT) Threats Report | Trends and Statistics Q3 2013
When it comes to cybersecurity, there are few...
Read More
WEB
Subcategory Web
Inoperable Computers and System Networks
Computer viruses and Trojan viruses can severely...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Targeted Attacks
Unlike mass computer virus attacks – that aim to...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Poseidon Group: a Commercial Malware Boutique Specializing in Global Cyberespionage
Poseidon Group: Global Cyberespionage Malware...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
The Onion Ransomware (Encryption Trojan)
In this section, you will discover the most...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Naikon Targeted Attacks
Naikon is a threat actor that appears to be...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
How Malware Penetrates Computers and IT Systems
For many computer virus writers and...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
Combining Social Engineering & Malware Implementation Techniques
With so many different types of malware – and the...
Read More
MALWARE (THREATS)
Subcategory Malware (threats)
'Grey Market' Business
In addition to students writing computer viruses...
Read More
1
...
6
7
Current page, page 8
8
9