China Hijacked an NSA Hacking Tool in 2014—and Used It for Years
The hackers used the agency’s EpMe exploit to attack Windows devices years before the Shadow Brokers leaked the agency’s zero-day arsenal online. More than four […]
Modlishka – The Tool That Can Bypass Two-Factor Authentication Via Phishing
While most users consider two-factor authentication a security measure to protect accounts, a researcher has proved otherwise. The researcher has simply deployed the tool online […]
Guidelines for Securing the Internet of Things
This ENISA study defines guidelines for securing the supply chain for IoT. ENISA with the input of IoT experts created security guidelines for the whole […]
Solving the Cryptography Riddle: Post-quantum Computing & Crypto-assets Blockchain Puzzles
The European Union Agency for Cybersecurity releases two reports on cryptography: one on the progress of post-quantum cryptography standardisation, and the other on exploring the […]
Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving
A report by the European Union Agency for Cybersecurity (ENISA) and the Joint Research Centre (JRC) looks at cybersecurity risks connected to Artificial Intelligence (AI) […]
AppleJeus: Analysis of North Korea’s Cryptocurrency Malware
Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics […]
France ties Russia’s Sandworm to a multiyear hacking spree
Destructively minded group has exploited an IT monitoring tool from Centreon. https://arstechnica.com/information-technology/2021/02/france-ties-russias-sandworm-to-a-multiyear-hacking-spree/ […]
Unpatched Android App with 1 Billion Downloads Threatens Spying, Malware
Attackers can exploit SHAREit permissions to execute malicious code through vulnerabilities that remain unpatched three months after app makers were informed. Mit dem Laden des […]
DDoS attack takes down EXMO cryptocurrency exchange servers
The servers of British cryptocurrency exchange EXMO were taken offline temporarily after being targeted in a distributed denial-of-service (DDoS) attack. https://www.bleepingcomputer.com/news/security/ddos-attack-takes-down-exmo-cryptocurrency-exchange-servers/ […]
FBI’s alert warns about using Windows 7 and TeamViewer
The FBI issues this week a Private Industry Notification (PIN) alert to warn companies about the risks of using out-of-date Windows 7 systems, poor account […]
Hackers break into research council servers, grant applications halted
Hackers gained access to the servers of the Dutch research council NWO, halting grant applications for the time being, the council said on Sunday. https://www.dutchnews.nl/news/2021/02/hackers-break-into-research-council-servers-grant-applications-halted/ […]
Singtel Suffers Zero-Day Cyberattack, Damage Unknown
The Tier 1 telecom giant was caught up in a coordinated, wide-ranging attack using unpatched security bugs in the Accellion legacy file-transfer platform. Mit dem […]
Volkswagen taps Microsoft’s cloud to develop self-driving software
Volkswagen AG on Thursday said it will use Microsoft Corp’s cloud computing services to help it streamline its software development efforts for self-driving cars. https://cybernews.com/news/volkswagen-taps-microsofts-cloud-to-develop-self-driving-software/ […]
DDoS attacks intensify — Driven in part by COVID-19 and 5G
Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons, widespread botnet activity, and some of the […]
Hackers ask only $1,500 for access to breached company networks
The number of offers for network access and their median prices on the public posts on hacker forums dropped in the final quarter of last […]
North Korean hackers stole more than $300 million to pay for nuclear weapons, says confidential UN report
North Korea’s army of hackers stole hundreds of millions of dollars throughout much of 2020 to fund the country’s nuclear and ballistic missile programs in […]