Pawn Storm APT targets members of Angela Merkel’s party
Pawn Storm, one of the oldest APTs engaging in cyber espionage, has been spotted targeting members of the German Christian Democratic Union (CDU), the political party of …
OnionDog APT targets the infrastructure industry
The Helios Team at 360 SkyEye Labs revealed that a group named OnionDog has been infiltrating and stealing information from the energy, transportation and other infrastructure …
The return of Carbanak: Banks face new attacks
A year after Kaspersky Lab warned that cyber-criminals would start to adopt the tools and tactics of nation-state backed APTs in order to rob banks, the company has confirmed …
Rise of automation: Battle of the bots
As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …
BlackEnergy APT is back, deleting files and killing computer systems
The BlackEnergy APT – or SandWorm group, as some researchers call it – has been active since 2007 (at least). Its past exploits include cyber-espionage campaigns …
Asian company is the newest APT threat
An unnamed South Asian software development consultancy that creates software for employee monitoring is also an APT player and, according to CloudSek CTO Rahul Sasi, it …
Will 2016 mark the end of the Advanced Persistent Threat?
Advanced Persistent Threats (APTs) as we know them will cease to exist in 2016, replaced by deeper, embedded attacks that are harder to detect and trace back to the …
1 in 4 organizations have experienced an APT
A new ISACA study found that more than one in four (28%) have already experienced an APT attack. The study found that mobile device security continues to lag at many …
1 in 4 organizations have experienced an APT
A new ISACA study found that more than one in four (28%) have already experienced an APT attack.The study found that mobile device security continues to lag at many …
Do attribution and motives matter?
Whenever people think of APTs and targeted attacks, people ask: who did it? What did they want? While those questions may well be of some interest, we think it is much more …
Previously unknown Moker RAT is the latest APT threat
“Researchers over at cybersecurity company enSilo have discovered a novel, powerful and persistent type of malware plaguing the network of one of their customers. This …
Attackers take over org’s OWA server, harvest domain credentials with malicious DLL
Researchers from cyber attack detection and response outfit Cybereason have discovered a novel APT technique that was used by attackers to gain persistence in an (unnamed) …
Featured news
Sponsored
Don't miss
- US exposes scheme enabling North Korean IT workers to bypass sanctions
- The importance of access controls in incident response
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)