Please turn on your JavaScript for this page to function normally.
Cyber crooks opt for APT method for delivering malware

“Delivering malware without it being flagged by users and security solutions is one of the biggest challenges malware peddlers face. Luckily for them, if they …

Darkhotel spying crew boosts attacks with Hacking Team exploit

Kaspersky Lab has discovered that the Darkhotel group, an elite spying crew uncovered by its experts in 2014 and famous for infiltrating Wi-Fi networks in luxury hotels to …

Chinese APTs use commercial VPN to hide their attack activity

A number of APT actors believed to be of Chinese origin are using a commercial VPN service to anonymize and obfuscate their attack activity.Dubbed Terracotta, the VPN service …

Sophisticated, successful Morpho APT group is after corporate data

Two reports published on Wednesday by Symantec and Kaspersky Lab detail the recent attacks executed by an unusual APT group they have dubbed Morpho and Wild Neutron.The group …

Flash Player 0-day exploited in the wild, patch immediately!

Adobe has released an emergency patch for its notoriously buggy Flash Player software because attackers are actively exploiting a critical vulnerability that can lead to total …

DDoS attacks now resemble APTs

DDoS attacks are beginning to resemble advanced persistent threats, evidenced by long durations, repetition and changing attack vectors aimed at evading simple, …

Kaspersky Lab reveals cyberattack on its corporate network

“In early spring 2015, Kaspersky Lab detected a cyber-intrusion affecting several of its internal systems. Following this finding the company launched an intensive …

New SANS course teaches infosec pros how to ruin attackers’ day

Once an adversary gains initial access into a network the vast majority, many of whom are maneuvering adroitly throughout the organization with stolen credentials, go …

APT group’s malware retrieved C&C IP addresses from Microsoft’s TechNet portal

“A China-based APT group has been using Microsofts TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers …

Defend your network from APTs that exploit DNS

Advanced Persistent Threats (APTs) are designed to spread, morph and hide within IT infrastructure to perpetrate a long term attack, posing a significant threat to the …

APTs: The fine balance of control and monitoring

Security is not about winning the war. It is more like insurance, it’s about how we handle risks. In order to successfully handle the risk of Advanced Persistent Threats …

72% of companies are not prepared for a data breach

EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of …

Don't miss

Cybersecurity news