Please turn on your JavaScript for this page to function normally.
Malicious Tor exit node is run by MiniDuke APT actors

The malicious Tor exit node located in Russia that added malicious code to the software downloaded by users has been tied to the APT actors wielding the MiniDuke backdoor. …

Most IT sec pros still rely on perimeter security to stop APTs

78 percent of IT security professionals are confident that firewalls and antimalware tools are robust enough to combat today’s advanced persistent threats, say the …

EMEA threat landscape: APTs nearly doubled

Malware attacks – especially advanced targeted attacks – have nearly doubled in the EMEA region in the first half of 2014, say the results of the analysis of …

Cyber security coalition aims to change the game against malware

It’s good to see that “collaboration” is not just an empty word for the cyber security industry. Novetta Solutions announced it is leading a cyber security …

Citadel malware becomes APT tool in newest hacking campaign

APT attackers wielding a newer, more dangerous versions of the Citadel malware have been targeting a number of Middle Eastern petrochemical companies, Trusteer researchers …

PittyTiger APT group sells its services to companies

APT attackers thought to be operating from China often seem financed by the government, but there are other groups that work for the highest bidder, which is usually a private …

1 in 5 enterprises experienced an APT attack

An ISACA global study shows that one in 5 organizations (21 percent) have experienced an advanced persistent threat (APT) attack, and 66 percent believe it’s only a …

Microsoft disrupts malware networks and APT operations

Microsoft’s Digital Crimes Unit struck again, and was allowed to seize 23 free domain names in an effort to strike a fatal blow to malware delivery networks run by a …

What’s next: Advanced Evasion Techniques

Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. …

Is your data already out there?

CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, …

Why Anonymous threats should not be ignored

International hacktivist group Anonymous is causing fear within the business and technology community once again, after a supposed Anonymous spokesperson warned that World Cup …

Recently patched IE 0-day abused in APT attacks

When Microsoft issued an out-of-band security update to patch the zero day Internet Explorer vulnerability on May 1, it was revealed by researchers from security company …

Don't miss

Cybersecurity news