A malicious code used by Turla APT in a recent campaign leverages comments posted to Instagram to obtain the address of the command and control servers. Malware researchers at security firm ESET have spotted a new piece of malware used by Turla APT in cyber attacks. The malicious code leverages comments posted to Instagram to obtain […]
Once again, Montenegro was targeted by the Russia-linked hacker group APT28, according to the experts it is just the beginning. On June 5 Montenegro officially joined NATO alliance despite the strong opposition from Russian Government that threatened to retaliate. Cybersecurity experts believe that a new wave of attacks from the cyberspace will hit the state. In February, for […]
A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware that controls router LEDs. A few months ago a group of researchers from Israeli Ben-Gurion University devised a new technique to exfiltrate data from a machine by using a malware that controls hard drive LEDs, now […]
Malicious ads in Google search results for the US retail giant Target redirected users to a tech support scam. The malvertising campaign was first reported last week by a US user who posted his observations to a StackExchange thread and was then reported by Bleepingcomputer.com. Just querying Google for the term “target,” users were displayed on the […]
Russian intelligence powered a cyber attack on at least one US voting software supplier and sent spear-phishing emails to election officials just days before Election The online news outlet The Intercept obtained access to a top-secret NSA report that shows Russian state-sponsored hackers tried repeatedly to hack the US voting systems before last 2016 Presidential election. […]
Security experts reported crooks are using a new technique to deliver malware through PowerPoint files, researchers warn of attacks in the wild. Crooks are using a new technique to deliver malware through PowerPoint documents. Security researchers recently discovered several malicious PowerPoint files that exploit the mouseover events to execute PowerShell code. Threat actors are sending out spam […]
US judges have other opinions to punish suspects that decide to don’t collaborate with police giving the iPhone passcode to unlock their devices. Forgetting passwords for an electronic device could be an option for suspects to avoid complying with a court order, but sometimes things can go wrong. US judges have other opinions to punish suspects that […]
Recent Qatar hack is sparking diplomatic tensions in the Gulf, Saudi Arabia, the United Arab Emirates, Egypt and Bahrain cut ties to the country. Saudi Arabia, the United Arab Emirates, Egypt and Bahrain say they want to interrupt any diplomatic relation with Qatar. According to Al Jazeera, the Saudi kingdom made the announcement via its […]
According to a report published by the London-based think tank Basic, the UK Trident submarines are vulnerable to cyber-attacks. According to a report published by the London-based think tank British American Security Information Council (Basic), the UK Trident submarine fleet is vulnerable to cyber-attacks. According to the report “Hacking UK Trident, A Growing Threat,” a cyber […]
Security experts at Rapid7 have discovered a security issue in the SSH configuration for its Nexpose appliances tracked as CVE-2017-5243. Owners of Nexpose appliances have to apply an update to their systems to fix the issue in the default SSH configuration. The devices were shipped with an SSH configuration that allowed obsolete algorithms to be […]