Reactions from the security community to the Adobe breach
Hackers have breached Adobe’s network and have made off with personal, account, and encrypted financial information of nearly 3 million Adobe customers, as well as the …
Icefog cyber espionage campaign exposed
Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, …
LynuxWorks releases a rootkit detection system
LynuxWorks announced the RDS5201, a new product to help detect the rootkit. Built on the LynxSecure 5.2 separation kernel and hypervisor, this small-form-factor appliance has …
NetTraveler APT group is back, adds watering hole attacks to its arsenal
The “Red Star” APT group employing the NetTraveler malware family is still active, but has changed its modus operandi. Its targets remain the same: government …
The TAO of NSA
In last week’s reports, it has been pointed out that NSA has its own hacking unit called Tailored Access Operations (TAO), and that its capabilities have been tapped for …
Decoy water plant attracts hackers, Chinese APT1 crew
A Trend Micro researcher that has lately concentrated on finding out just how often industrial control systems are attacked and from where has shared the latest findings of …
Automated remediation for APTs and 0-days
ThreatTrack Security unveiled The Spyder Initiative, a development strategy for solving the challenges cyber security professionals face, including the creation of custom, …
Lessons learnt from the Lakeland attack
Last Friday, the British Kitchenware store, Lakeland, suffered a major data breach that involved two encrypted databases. To make things worse, the company doesn’t know …
Combating attacks with collaborative threat intelligence
Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious …
It takes 10 hours to identify a security breach
Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …
Cyberespionage campaign targeting government-affiliated organizations
Kaspersky Lab experts published a new research report about NetTraveler, which is a family of malicious programs used by APT actors to successfully compromise more than 350 …
Plugging the trust gap
Every business and government is dependent upon cryptographic keys and certificates to provide trust for critical communications. These trust technologies underpin the modern …
Featured news
Resources
Don't miss
- Solana’s popular web3.js library backdoored in supply chain compromise
- How widespread is mercenary spyware? More than you think
- Product showcase: Securing Active Directory passwords with Specops Password Policy
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785)
- SafeLine: Open-source web application firewall (WAF)