Home Tags Cyber

Tag: Cyber

Cyber espionage group APT15 is back, this time stealing sensitive data from a UK government contractor.
Researchers have discovered that cyber-attackers can remotely gain control of an IoT camera, allowing them to spy on users and more.
DAILY VIDEO: Google urges webmasters to quickly replace untrusted Symantec certs; Tenable launches the Lumin cyber-exposure benchmarking platform; there's good news for the server business: revenue is up 25 percent in Q4 2017; and there's more.
At the Security Analyst Summit this year in Cancun, FireEye's Marina Krotofil talks about the Triton malware, first disclosed in December 2017, that targets industrial control systems.
As investigations continue about the backdoor that was planted in CCleaner, Avast said it has found that the actors behind the attack were planning to install a third round of malware on compromised computers.
The researchers at Kaspersky Lab ICS CERT decided to check the popular smart camera to see how well protected it is against cyber abuses.

This model has a rich feature list, compares favorably to regular webcams and can be used as a baby monitor, a component in a home security system or as part of a monitoring system.
VIDEO: Wendi Whitmore Global Partner and Lead at IBM X-Force Incident Response and Intelligence Services (IRIS) explains how organizations can improve their cyber-security posture with incident response.
Nation-sponsored Slingshot is one of the most advanced attack platforms ever.
Researchers have uncovered a new cyber-espionage threat that uses MikroTik routers as a springboard to launch attacks within a network.
Advanced hacking group appears to be native English speakers targeting Africa, Middle East.
A new analysis of the Russian-speaking Sofacy APT gang shows a continual march toward Far East targets and overlapping of activities with other groups such as Lamberts, Turla and Danti.
Hanwha is patching 13 vulnerabilities in its SmartCam security camera that allows attackers to take control of the device, use it to gain further network access or just brick it.