This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking. Targeted keywords in the new variant of the Ryuk stealer confirm that attackers are looking for confidential information in military, banking, finance and law enforcement.
China-linked threat actor tracked as CactusPete was employing an updated backdoor in recent attacks targeting military and financial organizations in Eastern Europe. All of them appeared between March 2019 and April 2020. Experts pointed out that despite the lack of sophistication, the group carried out successful attacks.
The Snatch ransomware group claims to have hacked HENSOLDT France, a company specializing in military and defense electronics. HENSOLDT is a company specializing in military and defense electronics. The post Snatch group claims to have hacked military provider HENSOLDT France appeared first on Security Affairs.
The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax. The United States Department of Justice officially charged 4 members of the China’s PLA’s 54th Research Institute, a division of the Chinese military, with hacking into credit reporting agency Equifax.
Britain and the United governments blame Russia for being behind a destructive cyber attack that hit Georgia during 2019. The governments of Britain and the US declared that Russia’s military intelligence service GRU is behind the massive cyber attack that hit Georgia during 2019. Pierluigi Paganini.
National Security Agency (NSA) is warning that Russia-linked APT group tracked Sandworm Team has been exploiting a critical vulnerability (CVE-2019-10149) in the Exim mail transfer agent (MTA) software since at least August 2019. The CVE-2019-10149 flaw, aka “The Return of the WIZard,” affects versions 4.87
BadPackets experts observed on August 22 a mass scanning activity targeting Pulse Secure “Pulse Connect Secure” VPN endpoints vulnerable to CVE-2019-11510. On August 22, BadPackets experts observed a mass scanning activity targeting Pulse Secure “Pulse Connect Secure” VPN endpoints vulnerable to CVE-2019-11510.
Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as Machete has stolen sensitive files from the Venezuelan military. ” reads the analysis from ESET. .”
Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.
ZDNet has reported in exclusive that a list of plaintext usernames and passwords for 900 Pulse Secure VPN enterprise servers, along with IP addresses, has been shared on a Russian-speaking hacker forum. According to Bank Security , all the Pulse Secure VPN servers included in the list were vulnerable to the CVE-2019-11510 flaw.
Experts uncovered a new cyber-espionage campaign, dubbed “ Operation In(ter)receptio n,” aimed at aerospace and military organizations in Europe and the Middle East. ” The campaign has been active between September and December 2019, ESET researchers speculate the involvement of the North Korea-linked Lazarus APT group.
as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers).
China-linked cyber espionage groups increasingly targeted organizations in the telecommunications industry in 2019. “Analysis in 2019 revealed a focus by Chinese adversaries on the telecommunications sector, which could support both signals intelligence and further upstream targeting. ” reads the report. Pierluigi Paganini.
Locked Shields 2019 – France wins, the world’s biggest and most advanced international cyber drills organized by NATO Cooperative Cyber Defence Center of Excellence (CCDCOE). . The team from France won the cyber defence exercise Locked Shields 2019 Czech and Swedish team take second and third place respectively.
China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group mainly focuses on high-profile orgs, including government entities and military orgs. ” reads the report published by Bitdefender.
The best news of the week with Security Affairs. Chinese Military personnel charged with hacking into credit reporting agency Equifax. OT attacks increased by over 2000 percent in 2019, IBM reports. Reading the 2019 Internet Crime Complaint Center (IC3) report. billion malware installs from Third-party stores in 2019.
In January, the company disclosed a security breach that might have exposed personal and confidential corporate data, at the time, it claimed that attackers did not obtain sensitive information about defense contracts. The intrusion took place on June 28, 2019, and the company launched an investigation in September 2019.
The best news of the week with Security Affairs. FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019. European Commission has chosen the Signal app to secure its communications. Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates. Lampion malware v2 February 2020.
The second Hack the Army bug bounty program ran between October 9 and November 15, 2019 through the HackerOne platform. We’re calling on civilian and military hackers to show us what they’ve got in this bug bounty and to help train the future force.”. There is only one way to secure our connected society, together, and the U.S.
Security experts have found a malicious app in the Google Play that exploits the recently patched CVE-2019-2215 zero-day vulnerability. Earlier October, Google Project Zero researchers Maddie Stone publicly disclosed a zero-day vulnerability , tracked as CVE-2019-2215 , in Android. ” reads a blog post published by Stone.
Security experts at vpnMentor’s discovered a breach in a database belonging to Autoclerk, a reservations management system owned by Best Western Hotels and Resorts Group. The list of affected users includes the US government, military, and Department of Homeland Security (DHS). . ” . . ” continues vpnMento r.
The best news of the week with Security Affairs. Citrix releases permanent fixes for CVE-2019-19781 flaw in ADC 11.1 OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda. The post Security Affairs newsletter Round 248 appeared first on Security Affairs. Pierluigi Paganini.
According to security researchers from Trend Micro, the Russia-linked APT28 cyberespionage group has been scanning vulnerable email servers for more than a year. The cyberespionage group continues to target members of defense companies, embassies, governments, and the military. ” continues the report. Pierluigi Paganini.
Ukraine CERT-UA published a security advisory to warn of spear-phishing attacks conducted by Russia-linked Armageddon APT (aka Gamaredon , Primitive Bear, Armageddon, Winterflounder, or Iron Tilden) targeting local state organizations. The group targeted government and military organizations in Ukraine. Pierluigi Paganini.
The Military Intelligence and Security Service (MIVD) warn of “worrying” cyber espionage activities carried out by Russia and China. The Military Intelligence and Security Service (MIVD) warn of “worrying” cyber espionage activities carried out by Russia and China. Koot (@mrkoot) April 26, 2019.
The Council Decision (CFSP) 2019/797 was established on May 17, 2019, it allows member states to invoke EU-wide sanctions against threat actors that carried out cyberattacks against their governments or the EU. The post European Council extends sanctions against foreign threat actors appeared first on Security Affairs.
Security experts from McAfee uncovered a new cyber-espionage campaign carried out by North Korean hackers that targeted the US defense and aerospace sectors. Recently, security experts from Kaspersky Lab reported that North Korea-linked hackers are attempting to spread a new ransomware strain known as VHD. Pierluigi Paganini.
The trio has worked as hackers-for-hire for the United Arab Emirates cybersecurity company DarkMatter between January 2016 and November 2019. DOJ also ordered the former intelligence employees to cooperate with the relevant department and FBI components; they are also condemned to a lifetime ban on future US security clearances.
Security experts from Cyble found alleged sensitive documents of NATO and Turkey, is it a case of cyber hacktivism or cyber espionage? “Based on the message body of the leak, the cyber attack indicates hacktivism, but last year, around May 23, 2019, UK warned NATO allies of hacking activities of Russia -> Link.
The best news of the week with Security Affairs. A new piece of Ryuk Stealer targets government, military and finance sectors. Which was the most common threat to macOS devices in 2019? Attacks on Citrix servers increase after the release of CVE-2019-19781 exploits. A new round of the weekly newsletter arrived!
The FBI and NSA have published a joint security alert containing technical details about a new piece of Linux malware, tracked as Drovorub , allegedly employed by Russia-linked the APT28 group. The post FBI and NSA joint report details APT28’s Linux malware Drovorub appeared first on Security Affairs. Pierluigi Paganini.
Federal Communications Commission (FCC) announced that Chinese telecommunications giants Huawei and ZTE are considered as national security threats. regulators declared Huawei and ZTE to be national security threats. In November 2019, the U.S. Last week China accused the US government of “oppressing Chinese companies” after U.S.
Ukraine’s premier law enforcement and counterintelligence disclosed the real identities of five alleged members of the Russia-linked APT group Gamaredon (aka Primitive Bear, Armageddon, Winterflounder, or Iron Tilden) that are suspected to be components of the Russian Federal Security Service (FSB). ” concludes the announcement.
The group targeted government and military organizations in Ukraine. In December 2019, the APT group targeted several Ukrainian diplomats, government and military officials, and law enforcement. “These macro injection modules also have the functionality to tamper with the Microsoft Office macro security settings.
The Transparent Tribe cyber-espionage group continues to improve its arsenal while targets Military and Government entities. The Transparent Tribe APT group is carrying out an ongoing cyberespionage campaign aimed at military and diplomatic targets worldwide. ” reads the analysis published by Kaspersky. Pierluigi Paganini.
” The Snatch ransomware was first spotted at the end of 2019, Sophos researchers discovered a piece of the Snatch ransomware that reboots computers it infects into Safe Mode to bypass resident security solutions. HENSOLDT is a company specializing in military and defense electronics.
Snatch gang claims the hack of the Department of Defence South Africa and added the military organization to its leak site. The group claims to have stolen Military contracts, internal call signs and personal data, for a total of 1.6 HENSOLDT is a company specializing in military and defense electronics. TB of data.
Cyber security department director Chien Hung-wei told parliament representatives that government infrastructure faces “five million attacks and scans a day” . On the other end, the Chinese government considers the island its territory and does not exclude its military occupation in the future. Pierluigi Paganini.
Last week, the UK’s National Cyber Security Centre (NCSC) reported that advanced persistent threat (APT) groups have been exploiting recently disclosed VPN vulnerabilities in enterprise VPN products in attacks in the wild. The CVE-2019-11510 flaw in Pulse Connect Secure is a critical arbitrary file read vulnerability.
The US Army has banned the use of the popular TikTok app on mobile phones used by its personnel for security reasons. 16 Defense Department Cyber Awareness Message identifying “TikTok as having potential security risks associated with its use,” according to the message.” ” reported the BBC. Pierluigi Paganini.
The UK’s National Cyber Security Centre (NCSC) warns of attacks exploiting recently disclosed VPN vulnerabilities in Fortinet, Palo Alto Networks and Pulse Secure. Threat actors leverage VPN vulnerabilities in Fortinet, Palo Alto Networks and Pulse Secure, to breach into the target networks. ” concludes the NCSC.
The best news of the week with Security Affairs. Google fixes a critical DoS flaw tracked as CVE-2019-2232 in Android. City of Pensacola hit by a cyberattack few days after military base shooting. Snatch Ransomware force systems to Windows Safe Mode to bypass security solutions. Pierluigi Paganini.
The activity of the Lyceum APT group was first documented earlier in August 2019 by researchers at ICS security firm Dragos which tracked it as Hexane. The attack chain observed by the researchers starts with spear-phishing messages using weaponized Word document disguised as a news report related to military affairs in Iran.
WikiLeaks founder Julian Assange should not be extradited to the US to stand trial, the Westminster Magistrates’ Court has rejected the US government’s request to extradite him on charges related to illegally obtaining and sharing classified material about national security. Pierluigi Paganini.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content