Please turn on your JavaScript for this page to function normally.
iOS spyware used by Pawn Storm cyber spies

Trend Micro researchers have unearthed two variants of a spyware specially designed for targeting devices running iOS, and at least one of them can be installed on …

APT gear: Custom Windows task hiding tool

Cyber attackers, especially persistent ones, use a variety of tools to break into target systems, assure their continuing presence in them and hide their actions, and …

UK GCHQ collected emails of UK, US journalists

British intelligence agency GCHQ has, at least on one occasion, slurped up emails sent by and to journalists working for a number of high-profile news organizations and shared …

North Korean networks compromised by NSA for a while now

A report based on documents from Edward Snowden’s NSA trove and published by Der Spiegel on Saturday described the extensive cyber spying and sabotaging capabilities of …

Russian hackers stole millions from banks, ATMs

Tens of millions of dollars, credit cards and intellectual property stolen by a new group of cyber criminals. Group-IB and Fox IT, in a joint research effort, released a …

Hackers hit execs for insider info to gain stock market advantage

FireEye’s researchers have identified yet another hacking group. Dubbed FIN4, the hacking crew seems to be comprised of native English speakers with “deep …

China is building a quantum encryption network between Beijing and Shanghai

The race for setting up a secure long-distance communication network based on quantum encryption is on, and China is currently in the lead, reports Malcolm Moore. After the …

Darkhotel espionage campaign targets corporate executives traveling abroad

Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate …

White House network breach was likely nation-sponsored

The White House has confirmed that the unclassified Executive Office of the President network has been breached by unknown hackers. People in the know speculate that the …

Russian-based cyber spies going after military, intelligence targets

FireEye today released a comprehensive intelligence report that assesses that an advanced persistent threat (APT) group may be sponsored by the Russian government. The report …

ScanBox keylogging framework lurking on disparate watering holes

Watering hole attacks are usually associated with cyber espionage efforts and are booby-trapped with exploit kits that deliver malware onto the visitors’ vulnerable …

Belgacom shares more details about alleged GCHQ breach

Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has allegedly mounted a successful attack against primarily state-owned …

Don't miss

Cybersecurity news