Search results

Notorious FIN7 crooks have new malicious code up their sleeves

by Sean Lyngaas • 1 week ago

It's the latest sign that FIN7 is resurgent.

Why Cyber Command’s latest warning is a win for the government's information sharing efforts

by Shannon Vavra • 3 months ago

New details uncovered by CyberScoop show how much coordination went into Cyber Command's public VirusTotal upload of an Iran-linked tool.

Dozens of Facebook pages about current events in Libya were linked to malware

by Jeff Stone • 4 months ago

Facebook removed the pages — which collectively had hundreds of thousands of followers — after notification from researchers, Check Point said.

Chinese spies have been sucking up call records at multinational telecoms, researchers say

by Sean Lyngaas • 4 months ago

The hacking campaign has breached about 10 cellular providers in Africa, Europe, the Middle East and Asia, according to Cybereason.

Researchers uncover new MuddyWater targeting of government, telecom entities

by Sean Lyngaas • 4 months ago

Undeterred by the reported dumping of its data online, an Iran-linked hacking group has been using malicious documents and files to impersonate government entities.

Inside a Chinese APT's very flexible playbook

by Sean Lyngaas • 8 months ago

New research from Dell Secureworks is a reminder that adversaries will sooner dust off and refashion old tools than build new ones.

For many crooks, malware is out and PowerShell attacks are in, IBM says

by Jeff Stone • 8 months ago

Fifty-seven percent of the cyberattacks detected by IBM X-Force Threat Intelligence used common applications like PowerShell or PsExec, compared to 29 percent that used more traditional phishing attacks.

How hackers used a PowerPoint file to spy on Tibet’s government-in-exile

by Sean Lyngaas • 9 months ago

The Tibetan diaspora has been targeted in a series of malware campaigns since 2016.

Cybercriminals 'hide in plain sight' to shake down West African financial players

by Jeff Stone • 9 months ago

Institutions in Cameroon, Congo, Ghana, Equatorial Guinea and Ivory Coast have been hit with cyberattacks that rely on known forms of malware as well as “living off the land” techniques.

How to combat the long lives of zero-day vulnerabilities

by cyber_admin • 1 year ago

Nyotron CTO Nir Gaist talks about how to deal with misconceptions around zero day vulnerabilities and what enterprises can do to guard against them.

TwitterFacebookLinkedInRedditGoogle Gmail