Tag: EN

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against critical Ukrainian infrastructure, including government agencies, key industries, and military entities. Phishing emails promoting integration with Amazon, Microsoft, and ZTA contained malicious .rdp files. Upon…

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in various sectors. The attacks involve sending signed RDP configuration files to thousands of targets, aiming to compromise systems for intelligence gathering.  The actor impersonates Microsoft…

The Evolution of Transparent Tribe’s New Malware

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…

Sophos Versus the Chinese Hackers

Really interesting story of Sophos’s five-year war against Chinese hackers. This article has been indexed from Schneier on Security Read the original article: Sophos Versus the Chinese Hackers

Russian Hackers Attacking Ukraine Military With Malware Via Telegram

Researchers discovered a Russian-linked threat actor, UNC5812, utilizing a Telegram persona named “Civil Defense. ” This persona has been distributing Windows and Android malware disguised as legitimate software designed to aid potential conscripts in Ukraine.  Once installed, these malicious apps…

Top Traceable API Security Alternative: Escape vs. Traceable

Learn why Escape’s agentless discovery and developer-friendly testing make it a top Traceable alternative. The post Top Traceable API Security Alternative: Escape vs. Traceable appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

What is Enterprise Compliance and Why is It Important?

In today’s fast-paced business world, companies juggle numerous responsibilities—from meeting customer demands to navigating complex regulations. One crucial area that’s often misunderstood but incredibly important is enterprise compliance.  What exactly is enterprise compliance, and why should it matter to you?…

Supply Chain Attack Uses Smart Contracts for C2 Ops

Checkmarx has observed a novel npm supply chain attack using Ethereum smart contracts to manage command-and-control (C2) operations This article has been indexed from www.infosecurity-magazine.com Read the original article: Supply Chain Attack Uses Smart Contracts for C2 Ops

Huawei Sees Sales Surge, But Profits Fall

US-sanctioned Huawei sees sales surge in first three quarters of 2024 on domestic smartphone popularity, even as net profits fall This article has been indexed from Silicon UK Read the original article: Huawei Sees Sales Surge, But Profits Fall