October 18, 2019
Via: Security WeekChinese state-sponsored hackers conducted cyber-espionage operations targeting various aerospace-related firms for years in an effort to help the county’s advancements in this sector, Crowdstrike reports. The identified hacking operation started in January 2010, just after the state-owned enterprise Commercial Aircraft […]
September 12, 2018
Via: Dark ReadingIt’s more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage. In the past, a midterm election season would pass without much fanfare. These have been torpid affairs with low voter turnout […]
November 17, 2017
Via: Security WeekThe Terdot banking Trojan packs information-stealing capabilities that could easily turn it into a cyber-espionage tool, Bitdefender says in a new report. Highly customized and sophisticated, Terdot is based on the source code of ZeuS, which leaked online in 2011. […]
September 20, 2017
Via: Security WeekA cyber espionage group linked by security researchers to the Iranian government has been observed targeting aerospace and energy organizations in the United States, Saudi Arabia and South Korea. The threat actor, tracked by FireEye as APT33, is believed to […]
Cyber-crime, Privacy protection
September 4, 2017
Via: We Live SecuritySecurity researchers at ESET have released new research today into the activities of the notorious Turla cyberespionage group, and specifically a previously undocumented backdoor that has been used to spy on consulates and embassies worldwide. ESET’s research team are the […]
Mobile security, Virus & Malware
July 28, 2017
Via: Hot for SecurityGoogle’s Android Security has found and blocked a series of targeted spyware apps, part of the Lipizzan malware family, believed to have been developed for cyber espionage. Although the apps seemed to have a benign behavior at first, a second […]
July 25, 2017
Via: Security WeekA China-linked cyber espionage group tracked by security firms as Lotus Blossom, Elise, Esile and Spring Dragon has used more than 600 malware samples in its attacks over the past years, according to Kaspersky Lab. Spring Dragon has been around […]
March 16, 2017
Via: Help Net Security20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat landscape. In addition, one in five U.S. organizations have suffered a cyber […]
November 29, 2016
Via: TrendMicro BlogWhile most enterprises are becoming more aware of threats like ransomware and DDoS attacks, very few know that they are also at risk of economic espionage; much less of associated tools like espionage-as-a-service offerings that attackers can easily avail of […]
August 18, 2016
Via: MalwarebytesRecently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible attribution has led us to the conclusion that this threat is in reality not new – probably it has […]
August 16, 2016
Via: Security AffairsThe hack to the US Presidential election is becoming even more mysterious, while security experts are blaming the Russia for the cyber espionage, a strange figure claims the responsibility for the security breach. He is Guccifer 2.0, an alleged lone […]
August 9, 2016
Via: SecurelistOver the last few years, the number of “APT-related” incidents described in the media has grown significantly. For many of these, though, the designation “APT”, indicating an “Advanced Persistent Threat”, is usually an exaggeration. With some notable exceptions, few of […]
November 18, 2015
Via: Dark ReadingPolitically motivated cyber-espionage groups also hard at work between July and September, according to Trend Micro. Although Trend Micro has seen a decline in the number of threats since 2012 — trending nearly 20 percent down — point-of-sale attacks are […]
October 7, 2015
Via: cyber-crimeThe Counter Threat Unit (CTU), the Dell SecureWorks research team, uncovered an initiative by an Iran-based threat group it dubbed #threat group 2889, to create a network of fake #linkedin profiles for “obtaining confidential #information they can use for cyber […]
October 7, 2015
Via: malwareKaspersky Lab experts tracking the activity of the ####winnti group have discovered an active threat based on a 2006 #bootkit installer. The threat, which they name HDRoot after the original tool’s name HDD Rootkit, is a universal #platform for a […]
September 9, 2015
Via: cyber-crimeResearchers from Kaspersky Labs disclosed this morning that advanced threat actors have found an insidious solution for the constant seizure and takedown of their domains and command-and-control (C&C) servers by ISPs and law enforcement agencies – the use of #satellite-based […]
April 30, 2024
April 11, 2024
May 6, 2024