View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
December 23, 2014

Online radar identifies most dangerous cyber threats

Targeted cyberattacks logbook includes research into 29 major targeted attacks, including Regin and Cloud Atlas.

By Ellie Burns

Kaspersky Lab is launching an online service that brings together all the information it holds on the most sophisticated cyber campaigns.

The interactive Targeted cyberattacks logbook project displays the research and analysis of the company’s Global Research and Analysis Team.

Currently, the team’s portfolio contains several years’ worth of research into 29 major targeted attacks, including high profile campaigns such as Regin, Darkhotel, Cloud Atlas, and more. Through the new service users can explore links between threats, as well as their trends and impact, or investigate the behaviour of specific threats.

The service makes it possible to view links between different cyber campaigns and retrieve detailed information on each of them, including the geography of infections, the ways in which malware was spread, the cybercriminals’ targets and the special features of each attack.

A convenient filter helps to sort the attacks by categories, making it possible to home in on those that, for example, only targeted information from private companies, in a specific country, and using certain techniques.

"Four years ago we could regard targeted cyber campaigns as one-offs, but now we are investigating more and more of these incidents every year. They are no longer unique events; they have found a special niche in the world of cyber threats and demand special attention," commented Alexander Gostev, Chief Security Expert at Kaspersky Lab.

That’s why we are launching this new online service. We want to demonstrate the scale of sophisticated cyber campaigns and provide a means of evaluating their growth and reach. In 2014 alone, we recorded more than 4,400 victims of targeted attacks on the corporate sector," concluded Gostev.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU