Monthly Archives: April 2017
Linux Shishiga malware, a threat in dangerous evolution
Malware researchers from security firm ESET have discovered a new Linux threat dubbed Shishiga malware targeting systems in the wild. Malware researchers from ESET have discovered a new Linux malware […]
Europol, European police agencies and private actors dismantled cybercrime ring
The Europol coordinated an international operation that dismantled a cybercrime ring that was offering services and tools to conceal malware. The Europol dismantled a cybercrime ring as the result of […]
Chinese APTs targeted the South Korean THAAD anti-missile systems
According to researchers at FireEye, Chinese hackers targeted the South Korean Terminal High Altitude Area Defense (THAAD) missile system. According to a new investigation conducted by security firm FireEye, Chinese […]
Karmen Ransomware, a cheap RaaS service that implements anti-analysis features
Experts at Recorded Future have discovered a cheap RaaS, the Karmen Ransomware that deletes decryptor if detects a sandbox. Security experts from threat intelligence firm Recorded Future have spotted a new ransomware as […]
Microsoft biannual transparency report – US foreign intelligence surveillance requests more than doubled
Microsoft published the biannual transparency report – The number of US foreign intelligence surveillance requests more than doubled. Microsoft shared data included in the biannual transparency report, the IT giant received […]
Terror EK rising in the threat landscape while Sundown EK drops
The Sundown EK has been inactive since early this year, the Terror EK is being very popular in the cybercriminal ecosystem. One year ago the Angler EK and Nuclear EK disappeared from the threat […]
Cyber Security Chicago to Debut in October 2017
Cyber Security Chicago to Debut in October 2017 Fast-Growing Cybersecurity Event Series Makes its Way into U.S. with Upcoming Show in Chicago CHICAGO – April 10, 2017 – Imago Techmedia […]
Symantec confirms that Longhorn group is tied to CIA operators detailed in Vault 7
Symantec reportedly linked the CIA hacking tools to a number of cyber attacks powered across the years by the Longhorn group. Security experts who analyzed the alleged CIA hacking tools included in […]
Dridex banking Trojan campaign exploited Microsoft Word 0day recently revealed
Millions of people were targeted by a phishing campaign exploiting a Microsoft Word 0day and aimed to spread the Dridex Banking Trojan. Recently security experts from firms McAfee and FireEye warned of a Microsoft […]
Alleged Russian hacker arrested in Spain reportedly over US Presidential Election Hack
Spanish law enforcement arrested in Barcelona the Russian hacker Pyotr Levashov who is suspected of being involved in attacks on 2016 US Election. Spanish law enforcement arrested in Barcelona the […]
IoT Amnesia Botnet puts at risk hundreds of thousands of DVRs due to unpatched flaw
Security experts at Palo Alto Networks have discovered a new Linux/IoT botnet dubbed Amnesia botnet that has been targeting digital video recorders (DVRs). Amnesia exploited an unpatched remote code execution […]
Operation Cloud Hopper – APT10 goes after Managed Service Providers
Security experts uncovered a widespread campaign tracked as Operation Cloud Hopper known to be targeting managed service providers (MSPs) worldwide. Chinese APT10 group is the main suspect. Security experts from PwC […]
South Korean users targeted with a new stealthy malware, the ROKRAT RAT
Security experts at CISCO Talos have spotted a new insidious remote access tool dubbed ROKRAT that implements sophisticated anti-detection measures. The ROKRAT RAT targets Korean users, people using the popular Korean […]
Phishing campaigns target airline consumers seeking business credentials
A series of phishing campaigns is targeting airline consumers with messages crafted to trick victims into handing over personal or business credentials. A wave string of phishing campaigns is targeting […]
The Strategic CISO: Learning from the Masters of War
There are seven useful strands of military strategic thought useful for modern CISOs. The first is the importance of ensuring that CISO’s objectives are always tied to the larger business […]
95,000 job seekers affected by the McDonald’s Canada data breach
The McDonald’s Canada career website was recently subject to a cyber-attack. Hackers stole records of 95,000 job seekers. McDonald’s Canada confirmed that hackers have stolen the personal data of about […]