Chinese APTs use commercial VPN to hide their attack activity
A number of APT actors believed to be of Chinese origin are using a commercial VPN service to anonymize and obfuscate their attack activity.Dubbed Terracotta, the VPN service …
Sophisticated, successful Morpho APT group is after corporate data
Two reports published on Wednesday by Symantec and Kaspersky Lab detail the recent attacks executed by an unusual APT group they have dubbed Morpho and Wild Neutron.The group …
Flash Player 0-day exploited in the wild, patch immediately!
Adobe has released an emergency patch for its notoriously buggy Flash Player software because attackers are actively exploiting a critical vulnerability that can lead to total …
DDoS attacks now resemble APTs
DDoS attacks are beginning to resemble advanced persistent threats, evidenced by long durations, repetition and changing attack vectors aimed at evading simple, …
Kaspersky Lab reveals cyberattack on its corporate network
“In early spring 2015, Kaspersky Lab detected a cyber-intrusion affecting several of its internal systems. Following this finding the company launched an intensive …
New SANS course teaches infosec pros how to ruin attackers’ day
Once an adversary gains initial access into a network the vast majority, many of whom are maneuvering adroitly throughout the organization with stolen credentials, go …
APT group’s malware retrieved C&C IP addresses from Microsoft’s TechNet portal
“A China-based APT group has been using Microsofts TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers …
Defend your network from APTs that exploit DNS
Advanced Persistent Threats (APTs) are designed to spread, morph and hide within IT infrastructure to perpetrate a long term attack, posing a significant threat to the …
APTs: The fine balance of control and monitoring
Security is not about winning the war. It is more like insurance, it’s about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats …
72% of companies are not prepared for a data breach
EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of …
Cyphort combines APT detection with lateral movement
At RSA Conference 2015, Cyphort announced the availability of Cyphort Advanced Threat Defense Platform 3.3, which includes malware lateral movement detection, the ability to …
White House cyber attackers linked to OnionDuke APT actor
“It’s widely believed that the October 2014 breaches of US State Department and White House computer systems have been executed by Russian hackers. Kaspersky Lab …
Featured news
Resources
Don't miss
- Solana’s popular web3.js library backdoored in supply chain compromise
- How widespread is mercenary spyware? More than you think
- Product showcase: Securing Active Directory passwords with Specops Password Policy
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)
- SafeLine: Open-source web application firewall (WAF)