CISA and FBI Observed APT Groups Targeting State Networks Related to US Election Systems

CISA and FBI Observed APT Groups Targeting State Networks Related to US Election Systems

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued an advisory after spotting advanced persistent threat (APT) actors exploiting multiple legacy vulnerabilities combined with a newer privilege escalation vulnerability—CVE-2020-1472—in Windows ...
Linux and macOS Versions of Commercial ‘Malware’ FinSpy Found Online by Amnesty International

Linux and macOS Versions of Commercial ‘Malware’ FinSpy Found Online by Amnesty International

Amnesty International revealed the existence of Linux and macOS variants of FinSpy, a commercially available spy suite used extensively by threat actors, as well as law enforcement agencies and government from around ...
Rooty Dolphin uses Mekotio to target bank clients in South America and Europe

Rooty Dolphin uses Mekotio to target bank clients in South America and Europe

Key Points  Rooty Dolphin is a threat actor who uses Mekotio to target banks  Mekotio is a banking trojan with Brazilian origins  Rooty Dolphin started targeting South America but moved to Europe some months ago ...
Analysis of the Top10 Hacktivist Operations

Analysis of the Top10 Hacktivist Operations

Key Points The most relevant hacktivist operations in the last 12 months were: #OpIceIsis, #OpChile, #OpChildSafety, #OpKillingBay and #OpBeast. The operation #OpGeorgeFloyd, born after George Floyd was killed by police in Minneapolis ...
Map of APT41 targets

Sounding the Pharma Alarma: An overview of the pharmaceutical threat landscape

The whole world is fighting the spread of COVID-19 and working to return to the lives we had before. Pharmaceutical and medical research teams in different countries are busy searching for a ...

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never ...
OilRig / APT34 profile

TOP 5 ATT&CK techniques used by Threat Actors tied to Iran

On the 3rd of January 2020, the Iranian Major General Qasem Soleimani was killed in a US drone strike ordered by President Donald Trump at Baghdad International Airport. Since then, popular demonstrations ...

Hacks and Breaches of 2019: A Year in Review

The reality is that most companies and entities are entrusted with sensitive data. As regulations tighten and consumer expectations rise, it is more important than ever to protect data, whenever it is ...
hackers

Hackers Impersonating Other Hacker Types

State-sponsored hackers and other threat actors are impersonating each other in an attempt to evade detection, according to a recent report from Optiv. The “2019 Cyber Threat Intelligence Estimate” report, comprised of ...
Security Boulevard
Developing Nations Cybercrime

Will Developing Nations Turn to Cybercrime to Fuel Their Economy?

Vietnam is one developing nation believed to be using cyberattacks to generate money As banks and financial institutions are increasingly targeted by financially motivated malicious actors the world over, protecting these organizations ...
Security Boulevard