English News

Hypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact

Hypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact

Targeted large-scale ransomware campaigns, referred to as big game hunting (BGH), remained the primary eCrime threat to organizations across all sectors in 2020. The relentless […]
NPower cyber attack – customers warned personal details may have been breached

NPower cyber attack – customers warned personal details may have been breached

The firm, owned by E.ON – one of the UK’s big six energy suppliers – has not revealed how many people may have been affected […]
Cybersecurity for 5G: ENISA Releases Report on Security Controls in 3GPP

Cybersecurity for 5G: ENISA Releases Report on Security Controls in 3GPP

The European Union Agency for Cybersecurity (ENISA) provides authorities with technical guidance on the 5G Toolbox measure for security requirements in existing 5G standards. The […]
CrowdStrike Slams Microsoft Over SolarWinds Hack

CrowdStrike Slams Microsoft Over SolarWinds Hack

CrowdStrike’s chief executive George Kurtz said the hackers were able to exploit Microsoft’s overly complicated and „antiquated“ architecture. “The threat actor took advantage of systemic […]
The Untold History of America’s Zero-Day Market

The Untold History of America’s Zero-Day Market

The lucrative business of dealing in code vulnerabilities is central to espionage and war planning, which is why brokers never spoke about it—until now. https://www.wired.com/story/untold-history-americas-zero-day-market/ […]
China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

China Hijacked an NSA Hacking Tool in 2014—and Used It for Years

The hackers used the agency’s EpMe exploit to attack Windows devices years before the Shadow Brokers leaked the agency’s zero-day arsenal online. More than four […]
Modlishka – The Tool That Can Bypass Two-Factor Authentication Via Phishing

Modlishka – The Tool That Can Bypass Two-Factor Authentication Via Phishing

While most users consider two-factor authentication a security measure to protect accounts, a researcher has proved otherwise. The researcher has simply deployed the tool online […]
Guidelines for Securing the Internet of Things

Guidelines for Securing the Internet of Things

This ENISA study defines guidelines for securing the supply chain for IoT. ENISA with the input of IoT experts created security guidelines for the whole […]
Solving the Cryptography Riddle: Post-quantum Computing & Crypto-assets Blockchain Puzzles

Solving the Cryptography Riddle: Post-quantum Computing & Crypto-assets Blockchain Puzzles

The European Union Agency for Cybersecurity releases two reports on cryptography: one on the progress of post-quantum cryptography standardisation, and the other on exploring the […]
Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving

Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving

A report by the European Union Agency for Cybersecurity (ENISA) and the Joint Research Centre (JRC) looks at cybersecurity risks connected to Artificial Intelligence (AI) […]
AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics […]
France ties Russia’s Sandworm to a multiyear hacking spree

France ties Russia’s Sandworm to a multiyear hacking spree

Destructively minded group has exploited an IT monitoring tool from Centreon. https://arstechnica.com/information-technology/2021/02/france-ties-russias-sandworm-to-a-multiyear-hacking-spree/     […]
Unpatched Android App with 1 Billion Downloads Threatens Spying, Malware

Unpatched Android App with 1 Billion Downloads Threatens Spying, Malware

Attackers can exploit SHAREit permissions to execute malicious code through vulnerabilities that remain unpatched three months after app makers were informed. Mit dem Laden des […]
DDoS attack takes down EXMO cryptocurrency exchange servers

DDoS attack takes down EXMO cryptocurrency exchange servers

The servers of British cryptocurrency exchange EXMO were taken offline temporarily after being targeted in a distributed denial-of-service (DDoS) attack. https://www.bleepingcomputer.com/news/security/ddos-attack-takes-down-exmo-cryptocurrency-exchange-servers/     […]
FBI’s alert warns about using Windows 7 and TeamViewer

FBI’s alert warns about using Windows 7 and TeamViewer

The FBI issues this week a Private Industry Notification (PIN) alert to warn companies about the risks of using out-of-date Windows 7 systems, poor account […]
Hackers break into research council servers, grant applications halted

Hackers break into research council servers, grant applications halted

Hackers gained access to the servers of the Dutch research council NWO, halting grant applications for the time being, the council said on Sunday. https://www.dutchnews.nl/news/2021/02/hackers-break-into-research-council-servers-grant-applications-halted/ […]