APT

Crypto exchange Upbit stems fake APT token flood, resumes services

Crypto exchange Upbit stems fake APT token flood, resumes services 25/09/2023 at 06:03 By Cointelegraph By Brayden Lindrea The newly created fake APT token called “ClaimAPTGift.com” made its way to 400,000 Aptos wallets, and users found they were able to deposit and sell it on the exchange. This article is an excerpt from Cointelegraph.com News […]

React to this headline:

Loading spinner

Crypto exchange Upbit stems fake APT token flood, resumes services Read More »

New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware

New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware 21/09/2023 at 23:32 By Ryan Naraine New and mysterious APT Sandman spotted targeting telcos in Europe and Asia as part of a cyberespionage campaign. The post New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware Read More »

How Next-Gen Threats Are Taking a Page From APTs

How Next-Gen Threats Are Taking a Page From APTs 13/09/2023 at 18:49 By Derek Manky Cybercriminals are increasingly trying to find ways to get around security, detection, intelligence and controls as APTs start to merge with conventional cybercrime. The post How Next-Gen Threats Are Taking a Page From APTs appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

How Next-Gen Threats Are Taking a Page From APTs Read More »

Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes

Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes 07/09/2023 at 00:03 By Ryan Naraine Microsoft reveals how a crash dump from 2021 inadvertently exposed a key that Chinese cyberspies later leveraged to hack US government emails. The post Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes appeared first on

React to this headline:

Loading spinner

Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes Read More »

APTs use of lesser-known TTPs are no less of a headache

APTs use of lesser-known TTPs are no less of a headache 14/08/2023 at 08:32 By Help Net Security APT (advanced persistent threat) attacks were once considered to be primarily a problem for large corporations, but the number of these (often state-sponsored) attacks against small- and medium-sized businesses has increased significantly. Everyone is fair game, and

React to this headline:

Loading spinner

APTs use of lesser-known TTPs are no less of a headache Read More »

Russian APT phished government employees via Microsoft Teams

Russian APT phished government employees via Microsoft Teams 03/08/2023 at 15:17 By Zeljka Zorz An APT group linked to Russia’s Foreign Intelligence Service has hit employees of several dozen global organizations with phishing attacks via Microsoft Teams, says Microsoft. A social engineering attack to bypass MFA protection “To facilitate their attack, the actor uses Microsoft

React to this headline:

Loading spinner

Russian APT phished government employees via Microsoft Teams Read More »

Ivanti Zero-Day Exploited by APT Since at Least April in Norwegian Government Attack

Ivanti Zero-Day Exploited by APT Since at Least April in Norwegian Government Attack 02/08/2023 at 09:31 By Eduard Kovacs The recently patched Ivanti EPMM zero-day CVE-2023-35078 has been exploited to hack the Norwegian government since at least April 2023. The post Ivanti Zero-Day Exploited by APT Since at Least April in Norwegian Government Attack appeared

React to this headline:

Loading spinner

Ivanti Zero-Day Exploited by APT Since at Least April in Norwegian Government Attack Read More »

Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups

Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups 01/08/2023 at 20:15 By Ionut Arghire Researchers unmask an Iranian-run company providing command-and-control services to hacking groups, including state-sponsored APT actors. The post Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups Read More »

North Korean hackers targeted tech companies through JumpCloud and GitHub

North Korean hackers targeted tech companies through JumpCloud and GitHub 21/07/2023 at 16:03 By Helga Labus North Korean state-sponsored hackers have been linked to two recent cyberattack campaigns: one involving a spear-phishing attack on JumpCloud and the other targeting tech employees on GitHub through a social engineering campaign. The JumpCloud intrusion On June 27, JumpCloud

React to this headline:

Loading spinner

North Korean hackers targeted tech companies through JumpCloud and GitHub Read More »

Microsoft Exchange servers compromised by Turla APT

Microsoft Exchange servers compromised by Turla APT 20/07/2023 at 15:17 By Helga Labus Turla has been targeting defense sector organizations in Ukraine and Eastern Europe with DeliveryCheck and Kazuar backdoors / infostealers and has been using compromised Microsoft Exchange servers to control them. Turla APT Turla (aka Secret Blizzard, Snake, UAC-0003) is a sophisticated and

React to this headline:

Loading spinner

Microsoft Exchange servers compromised by Turla APT Read More »

Thanks Storm-0558! Microsoft to expand default access to cloud logs

Thanks Storm-0558! Microsoft to expand default access to cloud logs 20/07/2023 at 13:31 By Zeljka Zorz Starting in September 2023, more federal government and commercial Microsoft customers will have access to expanded cloud logging capabilities at no additional charge, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) have announced on Wednesday. The announcements come

React to this headline:

Loading spinner

Thanks Storm-0558! Microsoft to expand default access to cloud logs Read More »

Rapid7: Japan Threat Landscape Takes on Global Significance

Rapid7: Japan Threat Landscape Takes on Global Significance 29/06/2023 at 18:46 By Kevin Townsend Rapid7 analyzes the Japan threat landscape and warns that attacks against the third-largest economy in the world have global consequences. The post Rapid7: Japan Threat Landscape Takes on Global Significance appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Rapid7: Japan Threat Landscape Takes on Global Significance Read More »

9 free cybersecurity whitepapers you should read

9 free cybersecurity whitepapers you should read 05/06/2023 at 07:30 By Helga Labus In today’s rapidly evolving digital landscape, organizations face constant cyber threats that can compromise their sensitive data, disrupt operations, and damage their reputation. Staying informed about the latest cyberattacks and understanding effective protection methods is crucial. This list of free cybersecurity whitepapers

React to this headline:

Loading spinner

9 free cybersecurity whitepapers you should read Read More »

SharpPanda APT Campaign Expands its Arsenal Targeting G20 Nations

SharpPanda APT Campaign Expands its Arsenal Targeting G20 Nations 01/06/2023 at 08:36 By cybleinc Cyble analyzes SharpPanda, a highly sophisticated APT group utilizing spear-phishing tactics to launch cyberattacks on G20 Nation officials. The post SharpPanda APT Campaign Expands its Arsenal Targeting G20 Nations appeared first on Cyble. This article is an excerpt from Cyble View

React to this headline:

Loading spinner

SharpPanda APT Campaign Expands its Arsenal Targeting G20 Nations Read More »

How APTs target SMBs

How APTs target SMBs 31/05/2023 at 13:47 By Helga Labus Small and medium businesses (SMBs) are not exempt from being targeted by advanced persistent threat (APT) actors, according to Proofpoint researchers. By analyzing a year’s worth of APT campaign data they collected from the 200,000+ SMBs that have their security solution deployed, they pinpointed three

React to this headline:

Loading spinner

How APTs target SMBs Read More »

Bl00dy Ransomware Targets Indian University: Actively Exploiting PaperCut Vulnerability

Bl00dy Ransomware Targets Indian University: Actively Exploiting PaperCut Vulnerability 30/05/2023 at 14:46 By cybleinc CRIL analyzes Bl00dy Ransomware’s recent targeting of an Indian University via exploitation of the PaperCut vulnerability. The post Bl00dy Ransomware Targets Indian University: Actively Exploiting PaperCut Vulnerability appeared first on Cyble. This article is an excerpt from Cyble View Original Source

React to this headline:

Loading spinner

Bl00dy Ransomware Targets Indian University: Actively Exploiting PaperCut Vulnerability Read More »

Researchers Spot APTs Targeting Small Business MSPs

Researchers Spot APTs Targeting Small Business MSPs 24/05/2023 at 21:37 By Ryan Naraine Proofpoint warns that APT actors linked to Russia Iran and North Korea are increasingly targeting small- and medium-sized businesses. The post Researchers Spot APTs Targeting Small Business MSPs appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Researchers Spot APTs Targeting Small Business MSPs Read More »

New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments

New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments 23/05/2023 at 19:48 By Ionut Arghire The newly detailed GoldenJackal APT has been targeting government and diplomatic entities in the Middle East and South Asia since 2019. The post New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments Read More »

Turla’s Snake malware network disrupted by Five Eyes’ agencies

Turla’s Snake malware network disrupted by Five Eyes’ agencies 10/05/2023 at 14:47 By Help Net Security The US Justice Department announced the completion of court-authorized operation MEDUSA, to disrupt a global peer-to-peer network of computers compromised by sophisticated malware, called “Snake” (aka “Uroburous”), that the US Government attributes to a unit within Center 16 of

React to this headline:

Loading spinner

Turla’s Snake malware network disrupted by Five Eyes’ agencies Read More »

BlackBit Ransomware: A Threat from the Shadows of LokiLocker

BlackBit Ransomware: A Threat from the Shadows of LokiLocker 07/05/2023 at 18:24 By cybleinc CRIL conducts a deep dive analysis into BlackBit, a ransomware variant based on the notorious LokiLocker ransomware. The post BlackBit Ransomware: A Threat from the Shadows of LokiLocker appeared first on Cyble. This article is an excerpt from Cyble View Original

React to this headline:

Loading spinner

BlackBit Ransomware: A Threat from the Shadows of LokiLocker Read More »

Scroll to Top