threat actors
CISA and FBI Observed APT Groups Targeting State Networks Related to US Election Systems
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued an advisory after spotting advanced persistent threat (APT) actors exploiting multiple legacy vulnerabilities combined with a newer privilege escalation vulnerability—CVE-2020-1472—in Windows ...
Linux and macOS Versions of Commercial ‘Malware’ FinSpy Found Online by Amnesty International
Amnesty International revealed the existence of Linux and macOS variants of FinSpy, a commercially available spy suite used extensively by threat actors, as well as law enforcement agencies and government from around ...
Rooty Dolphin uses Mekotio to target bank clients in South America and Europe
Key Points Rooty Dolphin is a threat actor who uses Mekotio to target banks Mekotio is a banking trojan with Brazilian origins Rooty Dolphin started targeting South America but moved to Europe some months ago ...
Analysis of the Top10 Hacktivist Operations
Key Points The most relevant hacktivist operations in the last 12 months were: #OpIceIsis, #OpChile, #OpChildSafety, #OpKillingBay and #OpBeast. The operation #OpGeorgeFloyd, born after George Floyd was killed by police in Minneapolis ...
Sounding the Pharma Alarma: An overview of the pharmaceutical threat landscape
The whole world is fighting the spread of COVID-19 and working to return to the lives we had before. Pharmaceutical and medical research teams in different countries are busy searching for a ...
The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond
Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never ...
TOP 5 ATT&CK techniques used by Threat Actors tied to Iran
On the 3rd of January 2020, the Iranian Major General Qasem Soleimani was killed in a US drone strike ordered by President Donald Trump at Baghdad International Airport. Since then, popular demonstrations ...
Hacks and Breaches of 2019: A Year in Review
The reality is that most companies and entities are entrusted with sensitive data. As regulations tighten and consumer expectations rise, it is more important than ever to protect data, whenever it is ...
Hackers Impersonating Other Hacker Types
State-sponsored hackers and other threat actors are impersonating each other in an attempt to evade detection, according to a recent report from Optiv. The “2019 Cyber Threat Intelligence Estimate” report, comprised of ...
Will Developing Nations Turn to Cybercrime to Fuel Their Economy?
Vietnam is one developing nation believed to be using cyberattacks to generate money As banks and financial institutions are increasingly targeted by financially motivated malicious actors the world over, protecting these organizations ...

