TARGETED ATTACKS AGAINST BANKS IN THE MIDDLE EAST
In the first week of May 2016, FireEye’s DTI identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region. The threat actorsRead More →
In the first week of May 2016, FireEye’s DTI identified a wave of emails containing malicious attachments being sent to multiple banks in the Middle East region. The threat actorsRead More →
The boom in PoS systems in the US has its drawbacks. Researchers from FireEye have disclosed the details of cyberattack group leveraging a Microsoft Windows zero-day flaw in targeted attacks againstRead More →
A threat actor named TA530 group, has been targeting executives in an attempt to infect their machine with various malware, including ransomware. Ransomware continues to represent one of the greatestRead More →
Rupture framework used to upgrade three-year-old BREACH framework and hack Facebook and Gmail 500 times faster. Security researchers have expanded and improved a three-year-old cyber-attack that could steal information from websitesRead More →
The United States Marine Corps has launched on March 25th a new hacker support unit named Marine Corps Cyberspace Warfare Group. It is unnecessary to remind the importance of cyber capabilitiesRead More →
Introduction The concept of file-less malware is not a new one. Families like Poweliks, which abuse Microsoft’s PowerShell, have emerged in recent years and have garnered extensive attention due toRead More →
Banking malware is using techniques once reserved for state-sponsored hacking gangs. To appreciate how malware targeting banks and other financial institutions is adopting sophisticated techniques once reserved for state-sponsored spiesRead More →
Rare public appearance from Tailored Access Operations leader. USENIX ENIGMA The United States National Security Agency (NSA) is a notoriously secretive organization, but the head of its elite Tailored Access OperationsRead More →
Dr.Web, a Russian antivirus maker, has detected a new threat against Linux users, the Linux.Ekocms.1 trojan, which includes special features that allow it to take screengrabs and record audio. DiscoveredRead More →
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, and say that I’m always willing to learn,teach, andRead More →