Cyber Attacks/Espionage

Cyber Attacks/Espionage news, information, and how-to advice

information security threat primary4
broken key

Brad Antoniewicz cisco

Cisco security researcher: Ransomware crowd big on customer service

Cisco security research breaks down the anatomy of a cyberattack throughout the exploit kit infection chain, all the way to ransomware attacks and investigation into such breaches, at SecureWorld Boston event

IRS

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber criminals to pull off even as attacks targeting taxpayer information continue unabated.

00 7spies title

How worried should your organization be about cyber espionage?

Criminal gangs are turning over millions from breaching businesses - but the organisations with the biggest budgets are the intelligence agencies of nation states. How seriously should your organisation take cyber espionage?...

iphone7 Apple store

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000.

IRS

IRS issues new tax scam warnings, FSA tool suspended due to security concerns

The Internal Revenue Service (IRS) has issued a new warning to businesses, taxpayers, and tax prep professionals about Phishing scams targeting the sensitive information they work with on a daily basis. Soon after, the IRS and the US...

170301 mwc 03173

Cisco to patch 300 devices against flaw found in CIA archives

After digging through the CIA archives released by WikiLeaks, Cisco says they've discovered a previously unknown flaw impacting 318 switch models. The bug, which the CIA has known about for an undetermined amount of time, can allow a...

IRS

More than 120,000 affected by W-2 Phishing scams this tax season

Tax season doesn't officially end in the United States until April 18. At last count, 110 organizations have reported successful Phishing attacks targeting W-2 records, placing more than 120,000 taxpayers at risk for identity fraud.

05 public wifi

Is your family's cybersecurity worth $20 a month?

If you're anything like me you're probably constantly on the prowl for WiFi networks to log into so that you can work, listen to music, browse, shop or read. Without being connected to the cloud via the internet your laptop or iPad...

cia cyber

How to destroy angels

An Internet of Things security researcher and exploit developer's professional analysis of the progress made by the CIA in the context of the Weeping Angels smart television research project.

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

170301 mwc 03173

Cisco and Apache issue warnings over Zero-Day flaw being targeted in the wild

Cisco's Talos says they've observed active attacks against a Zero-Day vulnerability in Apache's Struts, a popular Java application framework. Cisco started investigating the vulnerability shortly after it was disclosed, and found a...

stop nsa protester

Leaked docs suggest NSA and CIA behind Equation cyberespionage group

Purported CIA documents leaked Tuesday appear to confirm that the U.S. National Security Agency and one of CIA's own divisions were responsible for the malware tools and operations attributed to a group that security researchers have...

Spam examples

SpammerGate: The takeaway lessons and follow-ups on the River City Media data breach

Earlier this week, Salted Hash reported on the River City Media data breach, which exposed their operations fully. Today's follow-up examines some lessons learned, and few of the tools used by the company during their spamming...

hacker hacked power grid

Why the Ukraine power grid attacks should raise alarm

The cyber-attacks in Ukraine are the first publicly acknowledged incidents to result in massive power outages. Grid defenders should develop anticipatory responses to these and other ICS attacks.

kaspersky logo flag

Researchers link Middle East attacks to new victim in Europe

Kaspersky Labs announced new research this morning that shows some links between the massive Shamoon attack that took down 35,000 computers in Saudia Arabia to a new attack against a target in Europe

smashed mailbox

Spammers expose their entire operation through bad backups

In January, MacKeeper researcher Chris Vickery contacted Salted Hash with an interesting discovery, and with the help of Spamhaus, we were able to fully make sense of the data. What follows is an inside look at a well-known, but...

CISOs

Congrats - you’re the new CISO…now what

Before you buy that new shiny product, throw that old one in the trash, hire that whiz kid dressed in black, or change that process, you need foundational visibility into your security posture regarding what’s working and what’s not....

Load More