Top German official said Germany blocked Russian APT28 cyber attacks in 2016

9 years ago

According to a German top official, Germany warded off two cyber attacks launched by the Russian state actor APT28 group…

How much costs a DDoS attack service? Which factors influence the final price?

9 years ago

How much costs a DDoS attack service? Kaspersky Lab published an analysis on the cost of a DDoS attack and…

Security Affairs newsletter Round 105 – News of the week

9 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…

The Winnti Gang continues its activity and leverages GitHub for C&C Communications

9 years ago

Trend Micro discovered the Chinese threat actor Winnti has been abusing GitHub service for command and control (C&C) communications. Security…

Malware posing as Siemens PLC application is targeting ICS worldwide

9 years ago

Findings of the MIMICS project conducted by Dragos Threat Operations Center show a malware posing as Siemens PLC application is…

CVE-2017-0022 Windows Zero-Day flaw used by AdGholas hackers and it was included in Neutrino EK

9 years ago

The recently patched CVE-2017-0022 Windows Zero-Day vulnerability has been exploited by threat actors behind the AdGholas malvertising campaign and Neutrino…

Spear phishing campaign targeted Saudi Arabia Government organizations

9 years ago

Security researchers at MalwareBytes have uncovered a spearphishing campaign that targeted Saudi Arabia Government organizations. Security experts at MalwareBytes have…

US blames North Korea for the $81 million Bangladesh cyber heist

9 years ago

US federal prosecutors speculate the involvement of North Korea in the cyber heist of $81 million from Bangladesh's account at the New…

Fortinet researchers spotted a malware that infects both Microsoft and Apple OSs

9 years ago

Malware researchers at Fortinet have discovered a weaponized Word document that is able to start the infection process on both…

QNAP QTS Domain Privilege Escalation Vulnerability

9 years ago

The vulnerability allows any local user, such as "httpdusr" used to run web application, to escalate to Domain Administrator if…

This website uses cookies.