cyber espionage
iOS spyware used by Pawn Storm cyber spies
Trend Micro researchers have unearthed two variants of a spyware specially designed for targeting devices running iOS, and at least one of them can be installed on …
APT gear: Custom Windows task hiding tool
Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and …
UK GCHQ collected emails of UK, US journalists
British intelligence agency GCHQ has, at least on one occasion, slurped up emails sent by and to journalists working for a number of high-profile news organizations and shared …
North Korean networks compromised by NSA for a while now
A report based on documents from Edward Snowden’s NSA trove and published by Der Spiegel on Saturday described the extensive cyber spying and sabotaging capabilities of …
Russian hackers stole millions from banks, ATMs
Tens of millions of dollars, credit cards and intellectual property stolen by a new group of cyber criminals. Group-IB and Fox IT, in a joint research effort, released a …
Hackers hit execs for insider info to gain stock market advantage
FireEye’s researchers have identified yet another hacking group. Dubbed FIN4, the hacking crew seems to be comprised of native English speakers with “deep …
China is building a quantum encryption network between Beijing and Shanghai
The race for setting up a secure long-distance communication network based on quantum encryption is on, and China is currently in the lead, reports Malcolm Moore. After the …
Darkhotel espionage campaign targets corporate executives traveling abroad
Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate …
White House network breach was likely nation-sponsored
The White House has confirmed that the unclassified Executive Office of the President network has been breached by unknown hackers. People in the know speculate that the …
Russian-based cyber spies going after military, intelligence targets
FireEye today released a comprehensive intelligence report that assesses that an advanced persistent threat (APT) group may be sponsored by the Russian government. The report …
ScanBox keylogging framework lurking on disparate watering holes
Watering hole attacks are usually associated with cyber espionage efforts and are booby-trapped with exploit kits that deliver malware onto the visitors’ vulnerable …
Belgacom shares more details about alleged GCHQ breach
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has allegedly mounted a successful attack against primarily state-owned …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments