McAfee: The lure are North Korean political topics and the vector of attacks fake Microsoft Word documents. It has been used a new variant of the SYSCON backdoor.
A group, called Fajal 1337, launched a cyber attack against the website of Kerala government. Within a few hours, the Mallu Cyber Soldiers responded with a "stylish" revenge: more than 250 pakistani sites hacked
According to the Italian CERT, the malware is being released as a RaaS on the Dark Web, and requires no fee. Actually, awards are offered to those who will improve it. Ransom requests can vary from 500 to 1.500 dollars.
The Securities and Exchange Commission issued the updated document to provide views on public companies’ disclosure obligations on data breaches and other IT incidents.
There has been an explosion of the phenomenon. Scammers and cyber criminals use it not only to steal money directly from the targets, but to penetrate third parties too with man-in-the-middle attacks.
Lebanese hackers are using real and fake profiles to lure potential victims into downloading a spyware that steals informations and also can spy on conversations when the device is within range.
The process that transforms a hoax in a “phenomenon”, in particular on the social media, is simple. It is based on the vulnerability of the audience, and on the news/topics cycle.
The European Union and the ENISA are organizing Cyber Europe 2018 (CE2018), a maxi exercise of cybersecurity against the dangers of the sector, posed by cybercrime, terrorism and state hackers.
On the web the are tons of APPS that allow even the less experienced to try to hack smarphones and tablets. From Thechincidents the Top List of them.
New measures for telecom operators and online service providers in the draft of Loi de programmation militaire (LPM) 2019-2025. They will be required to play a more active role in protecting communications with the help of ANSSI.