Carbanak APT still targeting high-value financial institutions and casinos
The Anunak / Carbanak hacking group continues to target banks, but has also now hitting Forex-trading companies, casinos, and other institutions from which it can steal large …
Cyber crooks opt for APT method for delivering malware
“Delivering malware without it being flagged by users and security solutions is one of the biggest challenges malware peddlers face. Luckily for them, if they …
Darkhotel spying crew boosts attacks with Hacking Team exploit
Kaspersky Lab has discovered that the Darkhotel group, an elite spying crew uncovered by its experts in 2014 and famous for infiltrating Wi-Fi networks in luxury hotels to …
Chinese APTs use commercial VPN to hide their attack activity
A number of APT actors believed to be of Chinese origin are using a commercial VPN service to anonymize and obfuscate their attack activity.Dubbed Terracotta, the VPN service …
Sophisticated, successful Morpho APT group is after corporate data
Two reports published on Wednesday by Symantec and Kaspersky Lab detail the recent attacks executed by an unusual APT group they have dubbed Morpho and Wild Neutron.The group …
Flash Player 0-day exploited in the wild, patch immediately!
Adobe has released an emergency patch for its notoriously buggy Flash Player software because attackers are actively exploiting a critical vulnerability that can lead to total …
DDoS attacks now resemble APTs
DDoS attacks are beginning to resemble advanced persistent threats, evidenced by long durations, repetition and changing attack vectors aimed at evading simple, …
Kaspersky Lab reveals cyberattack on its corporate network
“In early spring 2015, Kaspersky Lab detected a cyber-intrusion affecting several of its internal systems. Following this finding the company launched an intensive …
New SANS course teaches infosec pros how to ruin attackers’ day
Once an adversary gains initial access into a network the vast majority, many of whom are maneuvering adroitly throughout the organization with stolen credentials, go …
APT group’s malware retrieved C&C IP addresses from Microsoft’s TechNet portal
“A China-based APT group has been using Microsofts TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers …
Defend your network from APTs that exploit DNS
Advanced Persistent Threats (APTs) are designed to spread, morph and hide within IT infrastructure to perpetrate a long term attack, posing a significant threat to the …
APTs: The fine balance of control and monitoring
Security is not about winning the war. It is more like insurance, it’s about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats …
Featured news
Sponsored
Don't miss
- Strategies for combating AI-enhanced BEC attacks
- Phishing statistics that will make you think twice before clicking
- Fighting identity fraud? Here’s why we need better tech
- eBook: 10 reasons why demand for cloud security is sky-high
- PoC exploit for Ivanti EPMM privilege escalation flaw released (CVE 2024-22026)