Notorious FIN7 crooks have new malicious code up their sleeves
It's the latest sign that FIN7 is resurgent.
Why Cyber Command’s latest warning is a win for the government's information sharing efforts
New details uncovered by CyberScoop show how much coordination went into Cyber Command's public VirusTotal upload of an Iran-linked tool.
Dozens of Facebook pages about current events in Libya were linked to malware
Facebook removed the pages — which collectively had hundreds of thousands of followers — after notification from researchers, Check Point said.
Chinese spies have been sucking up call records at multinational telecoms, researchers say
The hacking campaign has breached about 10 cellular providers in Africa, Europe, the Middle East and Asia, according to Cybereason.
Researchers uncover new MuddyWater targeting of government, telecom entities
Undeterred by the reported dumping of its data online, an Iran-linked hacking group has been using malicious documents and files to impersonate government entities.
Inside a Chinese APT's very flexible playbook
New research from Dell Secureworks is a reminder that adversaries will sooner dust off and refashion old tools than build new ones.
For many crooks, malware is out and PowerShell attacks are in, IBM says
Fifty-seven percent of the cyberattacks detected by IBM X-Force Threat Intelligence used common applications like PowerShell or PsExec, compared to 29 percent that used more traditional phishing attacks.
How hackers used a PowerPoint file to spy on Tibet’s government-in-exile
The Tibetan diaspora has been targeted in a series of malware campaigns since 2016.
Cybercriminals 'hide in plain sight' to shake down West African financial players
Institutions in Cameroon, Congo, Ghana, Equatorial Guinea and Ivory Coast have been hit with cyberattacks that rely on known forms of malware as well as “living off the land” techniques.
How to combat the long lives of zero-day vulnerabilities
Nyotron CTO Nir Gaist talks about how to deal with misconceptions around zero day vulnerabilities and what enterprises can do to guard against them.