APT (Advanced Persistent Threats)
‘CosmicStrand’ Highlights Ongoing Firmware Risks
You’re not imagining things; new firmware threats are appearing more often. The most recent is CosmicStrand, which exploits the Unified Extensible Firmware Interface (UEFI) to avoid detection. The new UEFI rootkit, detailed ...
Aoqin Dragon Has the Hallmarks of Chinese Espionage
Threat actor Aoqin Dragon continues its stealthy eight-year espionage campaign with attacks on targets primarily located in southeast Asia and Australia. The APT group typically targets government, education and telecommunications organizations, according ...
Why Timely Response is Essential and How to Achieve It
Advanced persistent threats continue to test organizations’ strength by exploiting new vulnerabilities, organizing massive supply chain incidents and targeting specific industries. According to a study, 84% of enterprises globally acknowledge that cyberattacks ...
New APT Group Mimic Colonial Pipeline Attackers, Others
Government servers and Russian energy and aviation industries seem to be the primary targets of a new advanced persistent threat (APT) group that has attacked organizations in 10 countries, using the supply ...
Cybersecurity New Year’s Resolutions from the Information Security Forum
It’s that time of year again. Time for every one of us to reminisce on the past year and make resolutions for how we can do better in the year ahead–particularly in ...
Mikko Hyppönen Discusses When It’s OK to Response to a Cyber Attack with Missiles
Inner Circle Podcast Episode 039 If a nation state launches a cyber attack against another nation state, is it acceptable to retaliate by launching missiles and engaging in a physical response? Or ...
Using Machine Learning to Reduce False Positives
Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle ...
Inner Circle Podcast Episode 018 – Kevin Livelli Discusses Cybercriminals Stealing the Nation State Hacker Playbook
…and vice versa. That should be part of the title too, but it was already quite lengthy. On this episode of The Inner Circle, I am joined by Kevin Livelli, Director of ...
Hackathon Uses Machine Learning to Improve Cybersecurity
Machine learning (ML) and artificial intelligence (AI) are hot technologies with significant promise for shaping the future, but it isn’t enough to understand ML or AI theory. Sure, you can gain a ...
6 Best Computer Forensic Analysis Tools
Computer forensics is of much relevance in today’s world. Though forensic analysis refers to searching and analyzing information to aid the process of finding evidence for a trial, computer forensic analysis is ...