Agregátor RSS
Critical NGINX Vulnerability CVE-2026-42945: What Linux Admins Should Check Now
Linux kernel flaw opens root-only files to unprivileged users
Recenze telefonu Honor 600 Lite. Odlehčený model upoutá dobrou výdrží a líbivým vzhledem
Gmail nabízí jen 5 GB místa, pokud mu nesvěříte telefonní číslo. Zatím jde o test v pár zemích
Ukládání informací na lepicí pásku? Vědci z PennState říkají ano!
TanStack weighs invitation-only pull requests after supply chain attack
The Fully Anesthetized Brain Can Still Track a Podcast
A new study challenges the idea that consciousness is necessary to make sense of language.
Our brains keep on whirling long after we drift off to sleep.
Each night, the hippocampus, a major hub for learning, replays experiences from the previous day and etches them into memory. And even in deep sleep, neurons in sensory regions of the brain spark with activity when they receive new stimuli, like sounds.
This raises a provocative question: How much is consciousness required to make sense of the world around us?
A new study suggests the unconscious brain can handle far more than simple sensory cues. Recording electrical activity from patients under general anesthesia, a team at Baylor College of Medicine and collaborators found the hippocampus continued processing sounds, words, and speech while patients listened to alternating tones and podcast clips.
Groups of neurons shifted their activity depending on the type of word spoken—nouns or verbs, for example—and predicted the next word in sentences.
“Our findings show that the brain is far more active and capable during unconsciousness than previously thought,” study author Sameer Sheth said in a press release. “Even when patients are fully anesthetized, their brains continue to analyze the world around them.”
Scientists have long thought that language processing, a complex computation, relied on awareness. Anesthesia disrupts large-scale communication across the brain, seemingly making complex language processing impossible. But the new findings suggest that even as global brain dynamics break down, some local circuits retain the ability to process sophisticated information—and, at least for storytelling, predict what comes next.
To be clear, it doesn’t mean that participants were secretly awake. Whether the brain retains local processing power during sleep, coma, or other states of unconsciousness is also up for debate.
But “this work pushes us to rethink what it means to be conscious,” said Sheth. “The brain is doing much more behind the scenes than we fully understand.”
Lights OutWe slip into unconsciousness every night. The brain shifts gears.
Compared to when we’re awake and alert, the mind’s activity patterns change dramatically. The hippocampus reactivates neurons involved in recent learning, rapidly replaying their activity patterns to strengthen neural connections. Elsewhere, the brain generates short bursts of electrical activity called sleep spindles, which shut off communication between regions necessary for processing new information from the outside world. These unique electrical signals are crucial for sorting new experiences and integrating them into long-term memory.
The brain is clearly busy during unconsciousness, but it also seems largely sealed off from its surroundings. Over the past two decades, however, scientists have increasingly realized the sleeping brain remains surprisingly alert.
In one study, volunteers repeatedly exposed to unfamiliar sounds during sleep were able to identify them after waking up. In another, participants hearing their own names or angry voices triggered brain activity even in deep sleep, a phenomenon called “sentinel processing.”
Scientists have also recorded directly from the brains of people with epilepsy, who had electrodes implanted to pinpoint the source of seizures. The researchers confirmed that the auditory cortex—the first region involved in processing sound—lit up with activity, but it appeared disconnected with regions responsible for interpreting meaning.
Similar patterns emerged under other states of unconsciousness. After receiving propofol, a common drug used to induce general anesthesia, patients still showed activity in their auditory cortex, but information relay to higher regions involved in cognition seemed to break down.
Or did it?
“The brain has developed such amazing, sophisticated mechanisms for doing all these complex tasks all day long, that it can do some of these things even without us being aware,” Sheth told Nature. They decided to take another look.
Someone’s HomeThe team focused on the hippocampus, best known as the brain’s memory center. Linking it to language processing seems like a stretch. But mounting evidence suggest the hub is responsible for far more than memory. It may also help organize information more broadly, from the mapping of physical spaces to watching other unfolding events like language.
It’s still a niche idea, said Sheth. But the hippocampus could play a much broader role in structuring the world around us—even without awareness. “How is the world organized? The hippocampus may be part of that as well,” he said.
To test the idea, the team recruited seven people undergoing epilepsy surgery. While they were under propofol anesthesia, the team inserted tiny probes into the hippocampus. Called Neuropixels, the implants are thinner than a human hair but packed with over a thousand sensors that eavesdrop on the electrical chatter of hundreds of neurons at once.
The team first played repetitive beeps to three participants, occasionally interrupted by random boops at a different pitch. In the beginning, neurons were indifferent to the oddball sounds. But within 10 minutes, their activity levels showed they were getting better at separating the unexpected tones from the normal ones.
“They learned over time to pay more attention to oddball sounds,” even while the person was fully unconscious, said Sheth.
A second test took things further. The team played 10-minute snippets from The Moth Radio Hour, a storytelling podcast featuring speakers from all walks of life, each with distinct intonations, turns of phrases, and accents.
Across the recordings, specific groups of hippocampal neurons responded to different linguistic features. Some were attuned to uncommon words like “cosmos.” Others tracked grammatical structure, responding differently to nouns, verbs, or adjectives.
The neurons also cared about semantic meaning, or the relationships between words. For example, they seemed to recognize that “cat” is conceptually closer to “dog” than an unrelated word like “pen.” The hippocampus also seemed to anticipate upcoming words based on the context of a sentence, with activity patterns similar to those seen in the awake brain.
“We are always making predictions about what we’re about to hear next,” said Sheth. Even under anesthesia, these neurons appeared to keep track of the narrative, indicating a “very sophisticated form of processing of the natural speech that they’re listening to.”
Despite intense neural activity, patients didn’t remember any of the podcast stories upon waking. Still, traces of the experience may have lingered unconsciously. In future studies, the team plans to test for this by exposing unconscious participants to different podcasts then later asking which ones feel familiar. They also want to explore whether the hippocampus processes stories told in unfamiliar languages.
The findings are preliminary, drawn from a small group of people under one type of anesthetic. The sleeping or comatose brain may work differently. But the work could help scientists decipher brain activity in people with severe traumatic brain injuries in a vegetative state. It could also guide the development of implants to rewire damaged neural circuits to other parts of the brain and reboot communication.
“Maybe the most important thing is what can we do about this,” said Sheth. For someone who’s unconscious, “can we bring them back?”
The post The Fully Anesthetized Brain Can Still Track a Podcast appeared first on SingularityHub.
⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More
⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More
Grafana says stolen GitHub token let hackers steal codebase
Věčný letoun Solar Impulse 2, který obletěl svět, havaroval u pobřeží USA. Vybily se mu baterie
Microsoft to retire ‘Together Mode,’ its virtual meeting space for Teams
Microsoft plans to retire “Together Mode” in Teams next month and is encouraging users to access its Gallery view for video calls instead.
The company launched Together Mode in the early months of the Covid-19 pandemic, as Teams usage rocketed and businesses sought ways to connect staff when physical offices closed due to social distancing policies.
Together Mode was positioned as a “shared virtual space” to enhance the feeling of connection while on a video call, with participants’ video feed cropped and placed in virtual scenes such as a conference room, coffee shop, or amphitheater. Microsoft claimed that Together Mode users were less likely to experience video meeting fatigue — a common complaint among remote workers as tools such as Teams and Zoom became the norm for office collaboration.
The feature could be seen as part of a wider push for more engaging and immersive meeting experiences, a move that extended to Microsoft’s metaverse for work concept, with its Mesh 3D meeting platform.
Microsoft retired Mesh last December (though an app for immersive events is still available with certain Teams subscriptions), and now Together Mode faces the same fate.
Together Mode will no longer be available as of June 30, a move that will “simplify the meeting experience” for users, said Katarina Tranker, Teams product manager, in a Monday blog post. At this point, the feature will be removed as an option from the View menu in Teams meetings, with the Gallery view the primary layout for group meetings.
“Today, the core need Together mode was designed to support, namely seeing the people who matter in a meeting, can now be fully met by the modern Gallery view, which can display up to 49 participants at once,” said Tranker.
The move to a single layout means fewer clicks for users and enables the product development team to move quicker to add new features, Microsoft said, while the Gallery is also less demanding on devices.
NGINX Rift attackers waste no time targeting exposed servers
How to Reduce Phishing Exposure Before It Turns into Business Disruption
How to Reduce Phishing Exposure Before It Turns into Business Disruption
Z Katovic do Vídně je to 1200 km a cesta vede přes Německo. Google nám už 16 let dluží cyklonavigaci
Poland directs officials to ditch Signal in favor of 'secure' state-developed alternative
IT threat evolution in Q1 2026. Mobile statistics
IT threat evolution in Q1 2026. Mobile statistics
IT threat evolution in Q1 2026. Non-mobile statistics
In the third quarter of 2025, we updated the methodology for calculating statistical indicators based on the Kaspersky Security Network. These changes affected all sections of the report except for the statistics on installation packages, which remained unchanged.
To illustrate the differences between the reporting periods, we have also recalculated data for the previous quarters. Consequently, these figures may significantly differ from the previously published ones. However, subsequent reports will employ this new methodology, enabling precise comparisons with the data presented in this post.
The Kaspersky Security Network (KSN) is a global network for analyzing anonymized threat information, voluntarily shared by users of Kaspersky solutions. The statistics in this report are based on KSN data unless explicitly stated otherwise.
The quarter in numbersAccording to Kaspersky Security Network, in Q1 2026:
- More than 2.67 million attacks utilizing malware, adware, or unwanted mobile software were prevented.
- The Trojan-Banker category was the prevalent mobile malware threat with a 10.86% share of total detections.
- More than 306,000 malicious installation packages were discovered, including:
- 162,275 packages related to mobile banking Trojans;
- 439 packages related to mobile ransomware Trojans.
The number of malware, adware, or unwanted software attacks on mobile devices decreased to 2,676,328 in Q1, down from 3,239,244 in the previous quarter.
Attacks on users of Kaspersky mobile solutions, Q3 2024 — Q1 2026 (download)
The overall drop in attack volume stems primarily from a reduction in adware and RiskTool detections. Nonetheless, this trend does not equate to a lower risk for mobile users. As shown later in this report, the number of unique users targeted by these threats remained relatively stable.
In Q1, Synthient researchers identified a link between the notorious Kimwolf botnet and the IPIDEA proxy network. This network was later taken down in cooperation with GTIG.
In early 2026, we discovered several apps on Google Play and the App Store that contained a new version of the SparkCat crypto stealer.
The Trojan code, meticulously concealed, was embedded into the infected Android apps. The obfuscated malicious Rust library was decrypted using a Dalvik-like virtual machine custom-built by the attackers. The iOS version of the malware also underwent several changes; specifically, the attackers began leveraging Apple’s proprietary Vision framework for optical character recognition (OCR).
Mobile threat statisticsThe number of Android malware samples saw a slight increase compared to Q4 2025, reaching a total of 306,070.
Detected malicious and potentially unwanted installation packages, Q1 2025 — Q1 2026 (download)
The detected installation packages were distributed by type as follows:
Detected mobile apps by type, Q4 2025* — Q1 2026 (download)
* Data for the previous quarter may differ slightly from previously published figures due to certain verdicts being retrospectively revised.
Threat actors once again ramped up the production of new banking Trojans; as a result, this category overtook all others in volume, accounting for more than half of all installation packages.
Share* of users attacked by the given type of malicious or potentially unwanted app out of all targeted users of Kaspersky mobile products, Q4 2025 — Q1 2026 (download)
* The total percentage may exceed 100% if the same users encountered multiple attack types.
Following the surge in banking Trojan installation packages, the number of associated attacks also rose, causing Trojan-Banker apps to climb one spot in terms of their share of targeted users. Mamont variants emerged as the most prevalent banking Trojans, accounting for 73.5% of detections, with the rest of the users encountering Faketoken, Rewardsteal, Creduz, and other families.
Yet banking Trojans were still outpaced by adware and RiskTool-type unwanted apps when measured by the total number of affected users. Despite a decrease in their share of installation packages, these two app types retained their positions as the top two threats by attack volume. The most common adware detections involved HiddenAd (44.9%) and MobiDash (38.1%), while most frequently seen RiskTool apps were Revpn (67%) and SpyLoan (20.5%).
TOP 20 most frequently detected types of mobile malwareNote that the malware rankings below exclude riskware or potentially unwanted software, such as RiskTool or adware.
Verdict %* Q4 2025 %* Q1 2026 Difference in p.p. Change in ranking Backdoor.AndroidOS.Triada.ag 2.62 7.09 +4.48 +10 DangerousObject.Multi.Generic. 6.75 5.84 -0.92 -1 DangerousObject.AndroidOS.GenericML. 3.52 5.51 +1.99 +6 Trojan-Banker.AndroidOS.Mamont.jo 0.00 5.28 +5.28 Trojan.AndroidOS.Fakemoney.v 5.40 3.44 -1.96 -1 Trojan-Downloader.AndroidOS.Keenadu.l 0.00 3.35 +3.35 Trojan-Banker.AndroidOS.Mamont.jx 0.00 3.09 +3.09 Backdoor.AndroidOS.Triada.z 4.87 3.08 -1.79 -2 Trojan.AndroidOS.Triada.fe 5.01 2.98 -2.02 -4 Backdoor.AndroidOS.Keenadu.a 2.07 2.73 +0.66 +6 Trojan-Banker.AndroidOS.Mamont.jg 0.34 2.37 +2.03 Trojan.AndroidOS.Triada.hf 2.15 2.23 +0.07 +3 Trojan.AndroidOS.Boogr.gsh 2.35 2.15 -0.20 0 Trojan.AndroidOS.Triada.ii 5.68 2.07 -3.60 -11 Backdoor.AndroidOS.Triada.ae 1.91 1.76 -0.16 +3 Backdoor.AndroidOS.Triada.ab 1.79 1.72 -0.08 +3 Trojan.AndroidOS.Triada.gn 2.38 1.58 -0.80 -5 Trojan-Banker.AndroidOS.Mamont.gg 1.56 1.50 -0.06 +2 Trojan.AndroidOS.Triada.ga 1.48 1.50 +0.01 +4 Backdoor.AndroidOS.Triada.ad 0.53 1.40 +0.87 +44* Unique users who encountered this malware as a percentage of all attacked users of Kaspersky mobile solutions.
The pre-installed Triada.ag backdoor rose to the top spot; it is similar to the older Triada.z version we documented previously. Because the same variant was pre-installed across a wide range of devices, the total number of affected users is aggregated. Consequently, Triada outpaced even Mamont, as users encountered a variety of Mamont variants, causing the share of that banking Trojan to spread across multiple rows. Other pre-installed Triada variants (Triada.z, Triada.ae, Triada.ab, and Triada.ad) also made the rankings. Furthermore, we observed increasing activity from the Keenadu.a backdoor, while diverse variants of the embedded Triada Trojan remained in the rankings.
Mobile banking TrojansQ1 2026 saw a characteristic rise in mobile banking Trojan activity, with the number of packages totaling 162,275, a 50% increase compared to the prior quarter.
Number of installation packages for mobile banking Trojans detected by Kaspersky, Q1 2025 — Q1 2026 (download)
We saw a similar growth in the previous quarter, with banking Trojan volumes rising by 50% during that period as well. Various Mamont variants accounted for the absolute majority of packages and represented nearly every entry in the rankings of most frequent banking Trojans by affected user count.
TOP 10 mobile bankers Verdict %* Q4 2025 %* Q1 2026 Difference in p.p. Change in ranking Trojan-Banker.AndroidOS.Mamont.jo 0.00 15.75 +15.75 Trojan-Banker.AndroidOS.Mamont.jx 0.00 9.22 +9.22 Trojan-Banker.AndroidOS.Mamont.jg 1.47 7.08 +5.61 +24 Trojan-Banker.AndroidOS.Mamont.gg 6.79 4.48 -2.32 -3 Trojan-Banker.AndroidOS.Mamont.ks 0.00 3.98 +3.98 Trojan-Banker.AndroidOS.Agent.ws 6.03 3.78 -2.25 -2 Trojan-Banker.AndroidOS.Mamont.hl 4.30 3.27 -1.03 +1 Trojan-Banker.AndroidOS.Mamont.iv 6.00 3.08 -2.92 -3 Trojan-Banker.AndroidOS.Mamont.jb 3.93 3.07 -0.86 +1 Trojan-Banker.AndroidOS.Mamont.jv 0.00 2.79 +2.79* Unique users who encountered this malware as a percentage of all users of Kaspersky mobile security solutions who encountered banking threats.
IT threat evolution in Q1 2026. Non-mobile statistics
IT threat evolution in Q1 2026. Non-mobile statistics
IT threat evolution in Q1 2026. Mobile statistics
The statistics in this report are based on detection verdicts returned by Kaspersky products unless otherwise stated. The information was provided by Kaspersky users who consented to sharing statistical data.
Quarterly figuresIn Q1 2026:
- Kaspersky products blocked more than 343 million attacks that originated with various online resources.
- Web Anti-Virus responded to 50 million unique links.
- File Anti-Virus blocked nearly 15 million malicious and potentially unwanted objects.
- 2938 new ransomware variants were detected.
- More than 77,000 users experienced ransomware attacks.
- 14% of all ransomware victims whose data was published on threat actors’ data leak sites (DLS) were victims of Clop.
- More than 260,000 users were targeted by miners.
In January 2026, it was reported that the FBI had seized the domains of the RAMP cybercrime forum, a major platform used extensively by ransomware developers to advertise their RaaS programs and to recruit affiliates. There has been no official statement from the FBI, nor is it clear if RAMP servers were seized. In a post on an external website, a RAMP moderator mentioned law enforcement agencies gaining control over the forum. The takedown disrupted a key element of the RaaS ecosystem, creating ripple effects for ransomware operators, affiliates, and initial access brokers.
A man suspected of links to the Phobos group was apprehended in Poland. He was charged with the creation, acquisition, and distribution of software designed for unlawfully obtaining information, including data that facilitates unauthorized access to information stored within a computer system.
In March, a Phobos ransomware administrator pleaded guilty to the creation and distribution of the Trojan, which had been used in international attacks dating back to at least November 2020.
In March, the U.S. Department of Justice charged a man who had acted as a negotiator for ransomware groups. The company he worked for specializes in cyberincident investigations. The prosecution alleges the suspect colluded with the BlackCat threat actor to share privileged insights into the ongoing progress of negotiations. Additionally, the suspect is alleged to have had a prior direct role in BlackCat attacks, serving as an affiliate for the RaaS operation.
In a separate development this March, a U.S. court sentenced an initial access broker associated with the Yanluowang ransomware group to 81 months of imprisonment. According to the U.S. Department of Justice, the convict facilitated dozens of ransomware attacks across the United States, resulting in over $9 million in actual loss and more than $24 million in intended loss.
Vulnerabilities and attacksThe Interlock group has been heavily exploiting the CVE-2026-20131 zero-day vulnerability in Cisco Secure FMC firewall management software since at least January 26, 2026. The vulnerability enabled arbitrary Java code execution with root privileges on the affected device. This campaign demonstrates the ongoing reliance on zero-day vulnerabilities for initial access, a focus on network appliances as high-value entry points, and the rapid weaponization of new vulnerabilities within the ransomware ecosystem.
The most prolific groupsThis section highlights the most prolific ransomware gangs by number of victims added to each group’s DLS. This quarter, the Clop ransomware (14.42%) returned to the top of the rankings, displacing Qilin (12.34%), which had held the leading position in the previous reporting period. Following closely is a new threat actor, The Gentlemen (9.25%). Emerging no later than July 2025, the group had already surpassed the activity levels of mainstays such as Akira (7.25%) and INC Ransom (6.13%).
Number of each group’s victims according to its DLS as a percentage of all groups’ victims published on all the DLSs under review during the reporting period (download)
Number of new variantsIn Q1 2026, Kaspersky solutions detected six new ransomware families and 2938 new modifications. Volumes have returned to Q3 2025 levels following a surge in Q4 2025.
Number of new ransomware modifications, Q1 2025 — Q1 2026 (download)
Number of users attacked by ransomware TrojansThroughout Q1, our solutions protected 77,319 unique users from ransomware. Ransomware activity was highest in March, with 35,056 unique users encountering such attacks during the month.
Number of unique users attacked by ransomware Trojans, Q1 2026 (download)
Attack geography TOP 10 countries and territories attacked by ransomware Trojans Country/territory* %** 1 Pakistan 0.79 2 South Korea 0.64 3 China 0.52 4 Tajikistan 0.40 5 Libya 0.38 6 Turkmenistan 0.36 7 Iraq 0.35 8 Bangladesh 0.33 9 Rwanda 0.30 10 Cameroon 0.28* Excluded are countries and territories with relatively few (under 50,000) Kaspersky users.
** Unique users whose computers were attacked by ransomware Trojans as a percentage of all unique users of Kaspersky products in the country/territory.
* Unique Kaspersky users attacked by the specific ransomware Trojan family as a percentage of all unique users attacked by this type of threat.
Miners Number of new variantsIn Q1 2026, Kaspersky solutions detected 3485 new modifications of miners.
Number of new miner modifications, Q1 2026 (download)
Number of users attacked by minersIn Q1, we detected attacks using miner programs on the computers of 260,588 unique Kaspersky users worldwide.
Number of unique users attacked by miners, Q1 2026 (download)
Attack geography TOP 10 countries and territories attacked by miners Country/territory* %** 1 Senegal 3.19 2 Turkmenistan 3.06 3 Mali 2.63 4 Tanzania 1.62 5 Bangladesh 1.06 6 Ethiopia 0.95 7 Panama 0.88 8 Afghanistan 0.79 9 Kazakhstan 0.77 10 Bolivia 0.75* Excluded are countries and territories with relatively few (under 50,000) Kaspersky users.
** Unique users whose computers were attacked by miners as a percentage of all unique users of Kaspersky products in the country/territory.
In Q1 2026, Google uncovered a new cryptocurrency theft campaign. The scammers directed victims to a fraudulent video call, prompting them to execute malicious scripts under the guise of technical support fixes for connection problems.
In March, researchers with GTIG and iVerify reported the discovery of an in-the-wild exploit chain targeting both iOS and macOS devices. The exploit kit was apparently marketed on the dark web, providing threat actors with a suite of spyware capabilities alongside specialized cryptocurrency exfiltration modules. The exploit was delivered via drive-by downloads when victims visited various compromised websites. Our analysis confirmed that the toolkit included an updated version of a component previously identified in the Operation Triangulation attack chain.
Devices running macOS were similarly impacted by the high-profile supply chain attack targeting the Axios npm package, a widely used HTTP client for JavaScript. The installation of the infected package led to the deployment of a backdoor on macOS devices.
TOP 20 threats to macOSUnique users* who encountered this malware as a percentage of all attacked users of Kaspersky security solutions for macOS (download)
* Data for the previous quarter may differ slightly from previously published data due to some verdicts being retrospectively revised.
The share of PasivRobber spyware attacks is beginning to decline, giving way to more traditional adware and Monitor-class software capable of tracking user activity. The popular Amos stealer also maintains its presence within the TOP 20.
Geography of threats to macOS TOP 10 countries and territories by share of attacked users Country/territory %* Q4 2025 %* Q1 2026 China 1.28 1.97 France 1.18 1.07 Brazil 1.13 0.98 Mexico 0.72 0.52 Germany 0.71 0.45 The Netherlands 0.62 0.75 Hong Kong 0.49 0.53 India 0.42 0.48 Russian Federation 0.34 0.37 Thailand 0.24 0.27* Unique users who encountered threats to macOS as a percentage of all unique Kaspersky users in the country/territory.
IoT threat statisticsThis section presents statistics on attacks targeting Kaspersky IoT honeypots. The geographic data on attack sources is based on the IP addresses of attacking devices.
In Q1 2026, the share of devices attacking Kaspersky honeypots via the SSH protocol saw a significant increase compared to the previous reporting period.
Distribution of attacked services by number of unique IP addresses of attacking devices (download)
The distribution of attacks between Telnet and SSH maintained the ratio observed in Q4 2025.
Distribution of attackers’ sessions in Kaspersky honeypots (download)
TOP 10 threats delivered to IoT devicesShare of each threat delivered to an infected device as a result of a successful attack, out of the total number of threats delivered (download)
The primary shifts in the IoT threat distribution are linked to the activity of various Mirai botnet variants, although members of this family continue to account for the majority of the list. Furthermore, a new variant, Mirai.kl, surfaced in the rankings. We also observed a significant decline in NyaDrop botnet activity during Q1.
Attacks on IoT honeypotsThe United States, the Netherlands, and Germany accounted for the highest proportions of SSH-based attacks during this period.
Country/territory Q4 2025 Q1 2026 United States 16.10% 23.74% The Netherlands 15.78% 17.57% Germany 12.07% 10.34% Panama 7.72% 6.34% India 5.32% 6.05% Romania 4.05% 5.82% Australia 1.62% 4.61% Vietnam 4.21% 3.50% Russian Federation 3.79% 2.35% Sweden 2.25% 2.09%China continues to account for the largest proportion of Telnet attacks, though there was a marked increase in activity originating from Pakistan.
Country/territory Q4 2025 Q1 2026 China 53.64% 39.54% Pakistan 14.27% 27.31% Russian Federation 8.20% 8.25% Indonesia 8.58% 6.71% India 4.85% 4.66% Brazil 0.06% 3.30% Argentina 0.02% 2.51% Nigeria 1.22% 1.38% Thailand 0.01% 0.55% Sweden 0.54% 0.55% Attacks via web resourcesThe statistics in this section are based on detection verdicts by Web Anti-Virus, which protects users when suspicious objects are downloaded from malicious or infected web pages. These malicious pages are purposefully created by cybercriminals. Websites that host user-generated content, such as message boards, as well as compromised legitimate sites, can become infected.
TOP 10 countries and territories that served as sources of web-based attacksThe following statistics show the distribution by country/territory of the sources of internet attacks blocked by Kaspersky products on user computers (web pages redirecting to exploits, sites containing exploits and other malicious programs, botnet C&C centers, and so on). One or more web-based attacks could originate from each unique host.
To determine the geographic source of web attacks, we matched the domain name with the real IP address where the domain is hosted, then identified the geographic location of that IP address (GeoIP).
In Q1 2026, Kaspersky solutions blocked 343,823,407 attacks launched from internet resources worldwide. Web Anti-Virus was triggered by 49,983,611 unique URLs.
Web-based attacks by country/territory, Q1 2026 (download)
Countries and territories where users faced the greatest risk of online infectionTo assess the risk of malware infection via the internet for users’ computers in different countries and territories, we calculated the share of Kaspersky users in each location on whose computers Web Anti-Virus was triggered during the reporting period. The resulting data provides an indication of the aggressiveness of the environment in which computers operate in different countries and territories.
This ranked list includes only attacks by malicious objects classified as Malware. Our calculations leave out Web Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.
Country/territory* %** 1 Venezuela 9.33 2 Hungary 8.16 3 Italy 7.58 4 Tajikistan 7.48 5 India 7.21 6 Greece 7.13 7 Portugal 7.10 8 France 7.05 9 Belgium 6.83 10 Slovakia 6.80 11 Vietnam 6.62 12 Bosnia and Herzegovina 6.57 13 Canada 6.56 14 Serbia 6.50 15 Tunisia 6.36 16 Qatar 6.01 17 Spain 5.95 18 Germany 5.95 19 Sri Lanka 5.89 20 Brazil 5.88* Excluded are countries and territories with relatively few (under 10,000) Kaspersky users.
** Unique users targeted by web-based Malware attacks as a percentage of all unique users of Kaspersky products in the country/territory.
On average during the quarter, 4.73% of users’ computers worldwide were subjected to at least one Malware web attack.
Local threatsStatistics on local infections of user computers are an important indicator. They include objects that penetrated the target computer by infecting files or removable media, or initially made their way onto the computer in non-open form. Examples of the latter are programs in complex installers and encrypted files.
Data in this section is based on analyzing statistics produced by anti-virus scans of files on the hard drive at the moment they were created or accessed, and the results of scanning removable storage media. The statistics are based on detection verdicts from the On-Access Scan (OAS) and On-Demand Scan (ODS) modules of File Anti-Virus and include detections of malicious programs located on user computers or removable media connected to the computers, such as flash drives, camera memory cards, phones, or external hard drives.
In Q1 2026, our File Anti-Virus detected 15,831,319 malicious and potentially unwanted objects.
Countries and territories where users faced the highest risk of local infectionFor each country and territory, we calculated the percentage of Kaspersky users whose computers had the File Anti-Virus triggered at least once during the reporting period. This statistic reflects the level of personal computer infection in different countries and territories around the world.
Note that this ranked list includes only attacks by malicious objects classified as Malware. Our calculations leave out File Anti-Virus detections of potentially dangerous or unwanted programs, such as RiskTool or adware.
Country/territory* %** 1 Turkmenistan 47.96 2 Tajikistan 31.48 3 Cuba 31.03 4 Yemen 29.59 5 Afghanistan 28.47 6 Burundi 26.93 7 Uzbekistan 24.81 8 Syria 23.08 9 Nicaragua 21.97 10 Cameroon 21.60 11 China 21.09 12 Mozambique 21.02 13 Algeria 20.64 14 Democratic Republic of the Congo 20.63 15 Bangladesh 20.44 16 Mali 20.35 17 Republic of the Congo 20.23 18 Madagascar 20.00 19 Belarus 19.78 20 Tanzania 19.52* Excluded are countries and territories with relatively few (under 10,000) Kaspersky users.
** Unique users on whose computers local Malware threats were blocked, as a percentage of all unique users of Kaspersky products in the country/territory.
On average worldwide, Malware local threats were detected at least once on 11.55% of users’ computers during Q1.
Russia scored 11.92% in these rankings.
Siri v iOS 27 projde radikální proměnou. Stane se součástí Dynamic Islandu a bude fungovat i jako samostatná aplikace
- « první
- ‹ předchozí
- …
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- …
- následující ›
- poslední »



