The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). Government officials from Germany and the Netherlands signed an agreement for the building of the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). The agreement was signed this week in Brussels, during a meeting […]
Researchers at Cisco Talos group have discovered a new exploit kit dubbed Spelevo that spreads via a compromised business-to-business website. Malware researchers at Cisco Talos have discovered a new exploit kit dubbed Spelevo that spreads via a compromised business-to-business website. The popularity of EK rapidly decreased with the demise of the Angler Exploit Kit, but the discovery […]
Allegedly Western nation-state actors breached the systems of Russian tech giant Yandex in 2018, the attack involved a new variant of the Regin malware. According to the Reuters, Western state-sponsored hackers breached the systems of the Russian tech giant Yandex in 2018, the attack involved a new variant of the Regin malware. The Regin malware has been […]
A long-running operation carried out by China-linked hackers, and tracked as Cloud Hopper, has targeted clients of major companies, including IBM, HPE, Tata CS, Fujitsu, and NTT. Hackers broke into the internal networks on major companies, such as HPE and IBM, and stole corporate data and trade secrets. Then the attackers used the stolen information […]
Hackers breached the infrastructure of PCM Inc., one of the major U.S.-based cloud solution provider, and accessed to email and file sharing systems for some of its clients. Hackers breached the infrastructure of PCM Inc., one of the major U.S.-based cloud solution provider. According to the popular investigator Brian Krebs, the attackers gained access to […]
Another cryptocurrency exchange announced to have suffered a theft, this time is the victim is the Singapore-based Bitrue. It has happened again, crooks stole funds from another cryptocurrency exchange, this time the victim is the Singapore-based Bitrue. Bitrue revealed on Thursday that hackers accessed the accounts of tens of its customers and stole their funds. […]
Multiple flaws in the BlueStacks Android emulator were addressed, including a vulnerability that allowed attackers to remotely control code execution. Other issues included information disclosure and a flaw that allowed attackers to steal backups of the VM and its data. In April, the researcher Nick Cano discovered that BlueStacks versions prior than v4.90.0.1046 are affected by a […]
Security expert Marco Ramilli analyzed similarities and differences between the MuddyWater and APT34 cyberespionage groups. Many state sponsored groups have been identified over time, many of them have different names (since discovered by different organizations) and there is no an agreed standardization on the topic but many victims and some interests look very tight together. […]
Experts discovered security flaws in EA Games’ login process that could allow an attacker to take over EA gamers’ accounts and steal sensitive data. Experts at Check Point Research and Cyberint discovered multiple security flaws in EA Games’ login process that could allow an attacker to take over EA gamers’ accounts and steal sensitive data. […]
European law enforcement agencies have arrested 6 individuals in connection with a €24 million ($27.2 million) cryptocurrency theft. An operation conducted by European law enforcement agencies resulted in the arrest of 6 individuals involved in a €24 million ($27.2 million) cryptocurrency theft. The group of cyber criminals is composed of five men and one woman, […]