• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
  • Pro-Russia Killnet group hit Dutch and European hospitals
  • New Prilex PoS Malware evolves to target NFC-enabled credit cards
  • New LockBit Green ransomware variant borrows code from Conti ransomware
  • Nevada Ransomware Has Released Upgraded Locker
  • TrickGate, a packer used by malware to evade detection since 2016
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category APT (Page 76)

APT

Russian APT28 group also targeted French Presidential candidate Emmanuel Macron

The campaign of the French Presidential candidate Emmanuel Macron has been targeted by the notorious cyber espionage APT28 group. Yesterday the Danish Government officially accused the dreaded APT28 group (aka Fancy Bear, Pawn Storm, Sednit, Sofacy,...

April 25, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber warfare  Hacking  Intelligence 

Denmark blamed Russia APT28 group for cyber intrusions in Defense Ministry Emails

Denmark on Monday denounced Russia after the publication of a report that accused Russian APT28 of hacking the defense ministry's email accounts. Today the Danish Government officially blamed Russia for cyber attacks against its Defense Ministry. Denmark...

April 24, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber warfare  Hacking 

Ops, hackers can exfiltrate data from air-gapped networks through a malware controlled via a scanner

A group of Israeli researchers has devised a new technique to exfiltrate data from a PC in an air-gapped network through malware controlled via scanners. The team was composed of Ben Nassi, a graduate student at the Cyber Security Research Center...

April 24, 2017  By Pierluigi Paganini   Posted In  APT  Hacking 

Callisto APT Group exploited Hacking Team surveillance tools to hack Government targets

The Callisto APT Group borrowed the source code leaked by hackers that broke into Hacking Team network. According to F-Secure Labs, The Callisto APT Group used the HackingTeam leaked surveillance software to gather intelligence on foreign and security...

April 16, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber Crime  Hacking  Intelligence 

Symantec confirms that Longhorn group is tied to CIA operators detailed in Vault 7

Symantec reportedly linked the CIA hacking tools to several cyber attacks powered over the years by the Longhorn group. Security experts analyzed the alleged CIA hacking tools included in the Vault 7 dump that have been used against at least 40 governments...

April 11, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber warfare  Intelligence 

Operation Cloud Hopper – APT10 goes after Managed Service Providers

Security experts uncovered a widespread campaign tracked as Operation Cloud Hopper known to be targeting managed service providers (MSPs) worldwide. Chinese APT10 group is the main suspect. Security experts from PwC UK and BAE Systems have uncovered...

April 6, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber warfare  Hacking  Intelligence 

Joining the dots between the ancient Moonlight Maze espionage campaigns and the Turla APT

Experts at Kaspersky presented the findings of its research that definitively connect the Moonlight Maze cyber espionage campaigns to the Turla APT group. One year ago, the researcher Thomas Rid at the Security Analyst Summit disclosed the alleged links...

April 4, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber warfare  Intelligence 

Turla hacking group continues to improve its Carbon backdoor

The Russian group Turla has continued to improve its Carbon backdoor, experts from ESET detected new versions released on a regular basis. The Russian APT group known as Turla (also known as Waterbug, KRYPTON and Venomous Bear) has continued to improve...

March 31, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber Crime  Cyber warfare  Intelligence  Security 

APT29 group used domain fronting to evade detection long before these techniques were widely known

Experts at FireEye discovered the APT29 group adopted domain fronting long before these techniques were widely known in the IT security community. Security firm FireEye continues to follow APT29 group (aka The Dukes, Cozy Bear and Cozy Duke), on Monday...

March 28, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber warfare  Hacking  Intelligence 

US blames North Korea for the $81 million Bangladesh cyber heist

US federal prosecutors speculate the involvement of North Korea in the cyber heist of $81 million from Bangladesh's account at the New York Federal Reserve Bank. The news was reported by The Wall Street Journal, prosecutors suspect the involvement...

March 24, 2017  By Pierluigi Paganini   Posted In  APT  Breaking News  Cyber Crime  Cyber warfare  Hacking  Intelligence 


« First‹ Previous727374757677787980Next ›Last »
Page 76 of 81



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version