Remove 2009 Remove Financial Services Remove IT Remove Ransomware
article thumbnail

Lazarus malware delivered to South Korean users via supply chain attacks

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. The activity of the Lazarus APT group surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

APIs are vital in our mobile digital world, but the consequences of API security flaws have yet to be seen. So how hard is it to hack APIs? Not very hard. They're on all your devices, [Peloton commercial]. And in May of 2021 Researchers disclosed that the Peloton API authentication was broken. I play an adversarial role with our clients.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

APIs are vital in our mobile digital world, but the consequences of API security flaws have yet to be seen. So how hard is it to hack APIs? Not very hard. They're on all your devices, [Peloton commercial]. And in May of 2021 Researchers disclosed that the Peloton API authentication was broken. I play an adversarial role with our clients.

article thumbnail

Zero Trust: Can It Be Implemented Outside the Cloud?

eSecurity Planet

The only exception, it seems, has been cloud service providers, who boast an enviable record when it comes to cybersecurity, thanks to rigorous security practices like Google’s continuous patching. Yet two years after the devastating Colonial Pipeline attack and strong advocacy from the U.S. The NIST guidance can be found here.

Cloud 109