Monday , 24 April 2017
Home » Tag Archives: attack

Tag Archives: attack

The hunt for the dawn of APTs: a 20 year-old attack that remains relevant to a modern APT

Kaspersky Lab and Kings College London researchers, looking for a link between a modern threat actor and the Moonlight Maze attacks that targeted the Pentagon, NASA and more in the late 1990s, have unearthed samples, logs and artefacts belonging to the ancient APT. The findings show that a backdoor used in 1998 by Moonlight Maze to tunnel information out of ... Read More »

With DDoS attacks on the rise, enterprises are pointing fingers in the wrong direction

Blake Gillman, Director,
Console Connect

Rises in both the volume and severity of distributed denial-of-service (DDoS) attacks should come as no surprise to most enterprises and organizations, but new research from Kaspersky and B2B International clarifies just how much the problem has grown in the last year alone. For example, the final three months of 2016 saw DDoS attacks in 80 countries, a significant increase on ... Read More »

Hackers: we will remotely wipe iPhones unless Apple pays ransom

Hackers are threatening to wipe out a large cache of data from 300 Million Apple accounts unless a ransom is paid. Labelling themselves as the ‘Turkish Crime Family’, the group or individual is demanding that £75,000 is to be paid in popular crypto-currency Bitcoin, or £100,000 worth of iTunes gift cards in exchange for deleting the data on the Apple ... Read More »

IT security pros and network operators view DDoS attacks as an increased concern in 2017

DDoS attacks are a greater security threat to businesses in 2017 than ever before, and Internet Service Providers (ISPs) need to do something about it according to a new survey of IT security professionals and network operators released today from Corero Network Security. The annual study, the Corero DDoS Impact Survey 2017, polled top technology decision makers and security experts ... Read More »

Alleged C.I.A. Hacking Documents Reinforce Need for SSL Traffic Inspection

Duncan Hughes, Systems Engineering Director, EMEA,
A10 Networks

WikiLeaks this month released thousands of documents containing several hundred million lines of code that it claims shine a light on the solutions and tactics the Central Intelligence Agency used to spy and hack into devices, including smartphones, computers and smart televisions. While there are still questions around the documents’ authenticity, if they are legitimate they show that the C.I.A. ... Read More »

Ixia’s security report shows organizations still vulnerable to brute force attacks

Ixia, a leading provider of network testing, visibility and security solutions, has announced the release of the first Ixia Security Report, a summation of 2016’s biggest security events including findings from Ixia’s Application and Threat Intelligence (ATI) Research Center, which uses a global network of honeypots and web crawlers to actively identify known and unknown malware, attack vectors and application ... Read More »

Cyber threat on the rise to UK businesses – NCSC and NCA Report

A report looking into cyber threat to UK business warns attacks are “significant and growing.” The report, which was conducted by the National Crime Agency (NCA) and National Cyber Security Centre (NCSC), highlighted ransomware as the most common cyber extortion method. Ransomware is a malware that locks a user out of their device after it has covertly installed itself on ... Read More »

How to Protect Yourself or Organization from Malware

Ransomware is one of the most infuriating kinds of cyber attack that’s cropped up over recent years, with hackers raking it in from hapless comouter users who just want their files back. Whilst we all hope for a perfect online community where such things wouldn’t happen, it’s evident that future is a long way away. So the team at AppRiver have ... Read More »

Researcher pops locks on keylogger, finds admin’s email inbox

Trustwave researcher Rodel Mendrez has gained access to the inbox of the criminal behind a commercial keylogger used to attack industries including finance, cloud services, logistics, foreign trade, and government. Mendrez’s reverse engineering effort found credentials buried within the Hawkeye keylogger that lead through redirection to the author’s inbox. Attackers behind Hawkeye were siphoning from compromised machines browser, email, and ... Read More »

Guru Briefing: SentinelOne on Ransomware

News from SentinelOne today has announced a new variation of the CryptXXX Ransomware, which they’ve clocked earning over $50,000 in Bitcoin payouts for its proponents thus far. As with other popular ransomware strains that have been improving with each iteration, the new CryptXXX is unbreakable by decryption tools and has already proven to be very successful in forcing ransom payments. ... Read More »