cyber espionage
![usa passport](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113315/usa-passport-400x200.jpg)
US-bound travelers looking for a visa might get a RAT instead
F-Secure researchers have discovered that travelers who applied for a US Visa in Switzerland have recently been targeted by cyber-criminals wielding the latest version of the …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113318/danger-400x200.jpg)
Pawn Storm APT targets members of Angela Merkel’s party
Pawn Storm, one of the oldest APTs engaging in cyber espionage, has been spotted targeting members of the German Christian Democratic Union (CDU), the political party of …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112808/botnet-jaku-400x200.jpg)
Jaku botnet hides targeted attacks within generic botnet noise
Botnets are usually created by cyber criminals that use them to launch DDoS attacks, deliver spam, effect click fraud. The recently discovered Jaku botnet can effectively do …
![Law legislation](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113340/law-400x200.jpg)
Hackers breaching law firms for insider trading info
Two of the most prestigious law firms in the US, best known for their financial services and corporate practices, have had their computer networks compromised by hackers. …
![Gmail](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194442/gmail-400x200.jpg)
New alerts for Gmail users targeted by state-sponsored attackers
Since 2012, Google has been warning Gmail users when they have been targeted by state-sponsored attackers, but now the alert will be even more visible (and therefore less …
![maritime ship cargo](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113814/maritime-400x200.jpg)
Sea pirates and cyber attacks: Information security breaches in the maritime industry
The Maritime Trade Information Sharing Center, Gulf of Guinea (MTISC-GoG) has denied that it has suffered a data breach that could result in sea pirates knowing details about …
![resurrection](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113925/hackingteam-400x200.jpg)
Is Hacking Team still using the same old, slightly modified malware?
A newly analyzed OS X malware sample shows that Hacking Team is likely still using old code for its newest spying tools. An alternative (but less likely) theory is that …
![Glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195442/glass-582689_1280-400x200.jpg)
BlackEnergy APT is back, deleting files and killing computer systems
The BlackEnergy APT – or SandWorm group, as some researchers call it – has been active since 2007 (at least). Its past exploits include cyber-espionage campaigns …
![Truth](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195346/truth-400x200.jpg)
Exposed: New toolset of the Sofacy cyber-espionage group
Kaspersky Lab has spotted new attacks by the Sofacy group which make use of several upgraded techniques designed for aggressive persistency and greater invisibility of …
Zero detection GlassRAT operated undetected for years
RSA Research has unearthed another Remote Access Tool/Trojan (RAT) used in cyber espionage campaigns. Dubbed GlassRAT, it has the usual capabilities of this type of malware: …
State-sponsored cyberattacks linked to Russian intelligence gathering
F-Secure Labs linked a number of state-sponsored cyberattacks to a hacking group engaged in Russian intelligence gathering. Specific targets of the attacks include the former …
US Energy Department’s systems breached 159 times in four years
The US Department of Energy (DOE) has had its computer systems successfully breached by cyber attackers 159 times in four years, USA Today reports.The US DOE is responsible, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD