Advanced Persistent Threats

Advanced Persistent Threats | News, how-tos, features, reviews, and videos

pharming  >  faudulent website redirect
Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

USA / United States of America stars + stripes and binary code superimposed over The White House

White House releases an ambitious National Cybersecurity Strategy

The Biden administration's National Cybersecurity Strategy calls for more regulation on critical infrastructure providers and holds software providers accountable for their insecure products.

shutterstock 2108082854 ukraine flag

Cybersecurity in wartime: how Ukraine's infosec community is coping

A year into the war, resilience and adaptation, risk and sacrifice are the hallmarks of being a cybersecurity professional in Ukraine.

team of hackers / organized attack / group of threat actors

China-based cyberespionage actor seen targeting South America

Cyberthreat group DEV-0147 is deploying the ShadowPad RAT to hit diplomatic targets in South America, expanding from its traditional attack turf in Asia and Europe, Microsoft says.

Security threat [illustration]  >  A hacker with black hat, mask, and crowbar breaks into a laptop.

Threat group targets over 1,000 companies with screenshotting and infostealing malware

Tactics and malware suggest financial motivation, but espionage might also be the goal.

cyber attack alarm alert

APT groups use ransomware TTPs as cover for intelligence gathering and sabotage

Changing tactics by North Korean, Russian, and Chinese APT groups suggest that Western companies are at greater risk.

CIO | Middle East  >  Iran  >  Isfahan  >  Khaju Bridge  >  Architecture / structure / connection

Chinese hackers targeted Iranian government entities for months: Report

The networks of four Iranian government organizations including Iran’s Ministry of Foreign Affairs, have likely been compromised.

Africa  >  Guinea  >  Conakry  >  harbor / harbour / shipping containers / cranes

US Maritime Administrator to study port crane cybersecurity concerns

Recently passed legislation might have been spurred by supply chain disruption and surveillance concerns enabled by Chinese-made cranes.

security threat / hacker / attack

Meta’s new kill chain model tackles online threats

Meta researchers say their Online Operations Kill Chain framework offers a common taxonomy to understand the threat landscape and spot vulnerabilities.

A firmware message appears on a circuit board.

Researchers show techniques for malware persistence on F5 and Citrix load balancers

Tests show that deploying malware in a persistent manner on load balancer firmware is within reach of less sophisticated attackers.

cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px

New Chinese attack framework Alchimist serves Windows, Linux, and macOS implants

Alchimist is easy to deploy and gives attackers a large suite of functionalities with which they can wreak havoc.

A binary map of china.

China’s attack motivations, tactics, and how CISOs can mitigate threats

A Booz Allen Hamilton report outlines global cyberthreats posed by the People’s Republic of China and gives some guidance on how to counter them.

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities

North Korea’s Lazarus group uses vulnerable Dell driver to blind security solutions

This first known exploit of the Dell vulnerability might inspire other malware developers who want to avoid detection of their code.

backdoor / abstract security circuits, locks and data blocks

Cyberespionage group developed backdoors tailored for VMware ESXi hypervisors

A possibly new threat actor packaged and deployed backdoors as vSphere Installation Bundles, gaining remote code execution and persistence capabilities.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

UK organizations, Ukraine's allies warned of potential "massive" cyberattacks by Russia

UK National Cyber Security Centre CEO Lindy Cameron reflects on Russia’s recent cyber activity as Ukraine warns its allies to prepare for cyberattacks targeting critical infrastructure.

global meeting conference international business

International cooperation is key to fighting threat actors and cybercrime

Western intelligence and national security leaders emphasize the importance of collaborating to better prepare and respond to cybersecurity threats.

CIO | Middle East  >  Iran  >  Flag

US government indicts Iranian nationals for ransomware and other cybercrimes

The Department of Justice and FBI claim three Iranian citizens conducted a global cybercrime operation while separately the US Treasury sanctions Iran.

CSO: Have you met these hackers? [slide 04]

Iranian cyberspies use multi-persona impersonation in phishing threads

Iran-sponsored groups use fake personas of real people to add credibility to phishing emails designed to deliver malware through remote template injection.

trojan horse malware virus binary by v graphix getty

North Korean state-sponsored hacker group Lazarus adds new RAT to its malware toolset

Lazarus has used the new remote access Trojan in campaigns that exploit the Log4Shell vulnerability and target energy companies.

Load More
You Might Also Like