Tag: EN

16-30 June 2024 Cyber Attacks Timeline

In the second timeline of June 2024, I collected 106 events (7.07 events/day) with a threat landscape dominated by… This article has been indexed from HACKMAGEDDON Read the original article: 16-30 June 2024 Cyber Attacks Timeline

The UN General Assembly and the Fight Against the Cybercrime Treaty

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> Note on the update: The text has been revised to reflect the updated timeline for the UN General Assembly’s consideration of the convention, which is now expected at the end of…

Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy

We analyze new tools DPRK-linked APT Sparkling Pisces (aka Kimsuky) used in cyberespionage campaigns: KLogExe (a keylogger) and FPSpy (a backdoor variant). The post Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy appeared first on Unit 42. This article has…

Octo2 Android Malware Attacking To Steal Banking Credentials

The original threat actor behind the Octo malware family has released a new variant, Octo2, with enhanced stability for remote action capabilities to facilitate Device Takeover attacks.  This new variant targets European countries and employs sophisticated obfuscation techniques, including the…

New MIT protocol protects sensitive data during cloud-based computation

Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often require powerful cloud-based servers. This dependency on cloud computing raises notable security concerns, particularly in sensitive sectors like healthcare. Hospitals,…