Data Leak
-
How to Identify a Cyber Adversary: What to Look For
Cyber-incident attribution gets a lot of attention, for good reasons. Identifying the actor(s) behind an attack enables taking legal or…
-
Breaches
How to Identify a Cyber Adversary: Standards of Proof
COMMENTARY Part one of a two-part article. In cybersecurity, attribution refers to identifying an adversary (not just the persona) likely…
-
Breaches
Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base
The Russian state-sponsored advanced persistent threat (APT) group known as Midnight Blizzard has nabbed Microsoft source code after accessing internal…
-
Breaches
Linux Variants of Bifrost Trojan Evade Detection via Typosquatting
A 20-year-old Trojan resurfaced recently with new variants that target Linux and impersonate a trusted hosted domain to evade detection.…
-
Breaches
Spoofed Zoom, Google & Skype Meetings Spread Corporate RATs
A threat actor is creating fake Skype, Google Meet, and Zoom meetings, mimicking these popular collaboration applications to spread various…
-
Breaches
GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia
Cybercriminals have developed an enhanced version of the infamous GhostLocker ransomware that they are deploying in attacks across the Middle…
-
Breaches
Taiwan’s Biggest Telco Breached by Suspected Chinese Hackers
Taiwan’s Defense Ministry is urging Chunghwa Telecom, the the island’s largest telecom company, to improve its cybersecurity following a data…
-
Breaches
Infrastructure Cyberattacks, AI-Powered Threats Pummel Africa
Most major economies in Africa experienced fewer overall cyber threats in 2023, but there were some dramatic exceptions: Kenya suffered…
-
Breaches
MTTR: The Most Important Security Metric
COMMENTARY Reducing risk has long been the guiding principle for security teams. However, even though security teams today are larger…
-
Breaches
Lovers’ Spat? North Korea Backdoors Russian Foreign Affairs Ministry
North Korean state hackers appear to be spying on Russia, by planting a backdoor inside of bespoke, internal government software.…
- 1
- 2