Home Tags Cyber

Tag: Cyber

WikiLeaks Reveals CIA Tool ‘Scribbles’ For Document Tracking

The CIA is planting web beacons inside Microsoft Word documents to track whistleblowers, journalists and informants, according to WikiLeaks.

Cyber-Attacks Continue to Be Financially Motivated, Verizon Finds

Verizon's 2017 Data Breach Investigations Report finds that hacking and malware are the leading causes of breaches, with ransomware use growing.

Cloudflare Debuts Orbit Security Service to Protect IoT Devices

New service from Cloudflare provides a buffer network for IoT devices that can help protect against unpatched vulnerabilities and cyber-attacks.

Threatpost News Wrap, April 28, 2017

Mike Mimoso and Chris Brook recap this year's SOURCE Boston Conference and discuss the week in news, including the long term implications of the NSA's DoublePulsar exploit, and the HipChat breach.

Sneaky ‘fileless’ malware flung at Israeli targets via booby-trapped Word docs

Spies, bank raiders gravitate to growing stealth technique A newly uncovered cyber-espionage campaign targeting Israeli organisations relies on "fileless" malware hidden in Microsoft Word documents, a hacker tactic that's becoming a growing menace.…

Sneaky ‘fileless’ malware flung at Israeli targets

Spies, bank raiders gravitate to growing stealth technique A newly uncovered cyber-espionage campaign targeting Israeli organisations relies on "fileless" malware, a hacker tactic that's becoming a growing menace.…

Ransomware, Cyberespionage Dominate Verizon DBIR

Verizon's Data Breach Investigations Report for 2017 shows big growth in the reported number of ransomware attacks and incidents involving cyberespionage.

Lack of Communication Achilles’ Heel for Ransomware Fighters

A member of law enforcement acknowledged at SOURCE Boston that the lack of communication around ransomware remains a serious problem.

Chrome to Mark More HTTP Pages ‘Not Secure’

Starting with Chrome 62, Google will start marking any HTTP page where users may enter data, and any HTTP page visited in incognito mode

The Time Has Arrived to Embrace Hackers

Source Boston keynoter Keren Elazari sounded a call to action for industry to extend an acceptance of hackers.

Attack Method Highlights Weaknesses in Microsoft CFG

As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from theoretical to real.

APT Threat Evolution in Q1 2017

Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations in over 80 countries.

During the first quarter of 2017, there were 33 private reports released to subscribers of our Intelligence Services, with IOC data and YARA rules to assist in forensics and malware-hunting.