Cyber Attacks/Espionage

Cyber Attacks/Espionage news, information, and how-to advice

Calendars and keys
maisto diecast toy cars

tools sockets

Got ransomware? These tools may help

Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you

ransom note letters

How to tell if you've been hit by fake ransomware

Ransomware is no joke, but sometimes, amateur attackers use 'pretend' ransomware -- and you can get your data back easily

us courthouse

Estonian man gets over 7 years in prison for role in global DNS hijacking botnet

An Estonian man was sentenced Tuesday to 87 months in prison in the U.S. for his role in a cybercriminal operation that infected over 4 million computers with DNS hijacking malware.

isis flag graphic

ISIS cyberattack capabilities are unorganized, underfunded -- for now

The U.S. and its allies should be concerned about cyberattacks from ISIS-affiliated groups, but the hackers are poorly organized and likely underfunded, at least in the short term, according to a new report.

hollywood presbyterian

Should hospitals pay up when it comes to ransomware?

Has the recent wave of ransomware attacks aimed at hospitals been a wakeup call for the healthcare industry? Or is this latest security plague just part of the new normal?

isis fighter

Pro-Daesh hackers: More bark than bite, lacking in skills and resources

A report from Flashpoint, released this morning, offers an overview on the current existence of pro-Daesh hacking groups and methods. Anyone who has followed the space in recent months won't be surprised by the findings – in short,...

Qatar National Bank

Examining the leaked passwords and PINs from Qatar National Bank

A 500MB file, published by Cryptome on Tuesday and said to be sourced from Qatar National Bank (QNB), contains thousands of sensitive financial records and client details. Also included with the leak are records of high profile...

spying eye

Cyberespionage group abuses Windows hotpatching mechanism for malware stealth

A cyberespionage group active in Asia has been leveraging a Windows feature known as hotpatching in order to better hide its malware from security products.

cyber warfare war

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit.

fending off

10 ways to fend off data breaches and hacks

Ecommerce and security experts provide 10 tips for preventing breaches and hacks and keeping customer data safe.

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report contains bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all....

phishing cyber theft hacked scam

Phishing emails leverage unique subject lines, Office docs

Phishing emails continued to evolve last year, with Microsoft Office documents and unique subject lines used to get past enterprise filters.

Personal information is being held for ransom

Website offers Doxing-as-a-Service and customized extortion

There's a website on the Dark Web offering to store Dox and accept a ransom payment to have it removed. In addition, the website provides a Doxing-as-a-Service platform, which promises to collect a complete profile on a person for...

android figurine

Malvertising: Exploit Kit pushes Ransomware to Android devices

It isn't Ransomware in the traditional sense, as there's no encryption, but Android devices are being targeted by malware that hijacks mobile advertisements to scam gift cards, researchers at Blue Coat Labs discovered.

jigsaw ransomware logo

You’ve been hit with ransomware. Now what?

When their data has been stolen, and is being held hostage, companies are increasingly caving in to cybercriminal demands for payment. Short of paying up, the best defense is a good offense.

mechanical fish phishing

Machine learning and social engineering attacks

In my last post I promised to use some real-world use cases from the recent Verizon Data Breach Digest report to illustrate potential ways that machine learning be can used to detect or prevent similar incidents in the future. For my...

crowd subway station

Two perspectives on social media for security leaders

Brian Reed and Ian Amit from ZeroFox blend two unique perspectives and experience on social media into an action plan for security leaders


Hacking Team postmortem is something all security leaders should read

Hacking Team is back in the news again. Last weekend, the person responsible for Hacking Team's meltdown posted a recap of the incident, including a detailed overview of how they hacked the Italian firm. It's a fascinating read on its...

Load More