Security Affairs

Experts at Yoroi – Cybaze Z-Lab analyzed MuddyWater Infection Chain

Malware researchers at Yoroi - Cybaze Z-Lab analyzed the MuddyWater Infection Chain observed in a last wave of cyber attacks.…

7 years ago

Evidence in Marriott’s subsidiary Starwood hack points out to China intel

According to a report published by the Reuters, the massive Marriott data breach was carried out by Chinese state-sponsored hackers. According to…

7 years ago

Ukraine’s SBU: Russia carried out a cyberattack on Judiciary Systems

Ukraine is accusing Russian intelligence services of carrying out cyberattacks against one of its government organizations. Ukraine's security service SBU announced…

7 years ago

DHS and FBI published a joint alert on SamSam Ransomware

The US Department of Homeland Security (DHS) and the FBI issued a joint alert on SamSam attacks targeting critical infrastructure.…

7 years ago

CVE-2018-15982 Adobe zero-day exploited in targeted attacks

Adobe released security updates for Flash Player that address two vulnerabilities, including a critical flaw, tracked as CVE-2018-15982, exploited in targeted attacks.…

7 years ago

Fractured Block Campaign: CARROTBAT dropper dupports a dozen decoy document formats

Palo Alto Networks recently discovered a malware dropper, dubbed CARROTBAT, that supports a dozen decoy document file formats to drop…

7 years ago

Email accounts of top NRCC officials were hacked in 2018

Threat actors had access to the email accounts of at least four NRCC aides and spied on thousands of sent…

7 years ago

M2M protocols can be abused to attack IoT and IIoT systems

Security experts from Trend Micro discovered that some machine-to-machine (M2M) protocols can be abused to attack IoT and industrial Internet of…

7 years ago

Dissecting the latest Ursnif DHL-Themed Campaign

Security experts at Yoroi - Cybaze Z-Lab discovered a new variant of the infamous Ursnif malware targeted Italian users through a malspam…

7 years ago

4 Industries That Have to Fight the Hardest Against Cyberattacks

Society's dependence on internet-based technologies means security professionals must defend against cyberattacks as well as more traditional threats, such as…

7 years ago

This website uses cookies.