Cisco Talos Cyber Security experts: The banking trojan is utilizing an updated persistence mechanism that can make it harder for users to detect and remove it.
A massive counterattack is underway to tighten the circle on the General's troops south of Tripoli. Meanwhile, Sarraj flies to Italy to ask for post-civil war support.
Barracuda Networks cyber security experts: In March 2019, 29% of businesses accounts were compromised. For ATOs are used brand impersonation, social engineering, and phishing.
Fifth chapter of a study on the history of the two groups, to understand why they share the same roots and purposes aimed at recreating the Caliphate. Al-Baghdadi, Syria and the Islamic State.
Malwarebytes cyber security experts: Almost 80% of the cybercrime codes that attacks the sector are trojans. There are also different ones as fileless, ransomware and cryptominers.
Baghdad sends PMF to Anbar to prevent trespassing of the Islamic State. For Daesh, the south is the only route: to the north, the SAA attacks HTS in Idlib and in the east there are the SDF.
Trend Micro cyber security experts: Its used in combination with basic pop-up authentication to freeze a user’s browser and steal credentials and information.
New Islamic State attacks on the SAA between Homs and Deir Ezzor, perhaps due to the presence of Al-Baghdadi. Iraq, Daesh loses the Hamrin mountains, maybe thanks to the F-35s.
Yoroi-Cybaze cyber security experts: After APT28, also Gamaredon is spying Kiev. The lure is a legit military document, weaponized with Pteranodon malware.
The leader of the Islamic State appears in a recording in which he talks about Daesh defeat in Baghouz, Sri Lanka and new pledges. But many Daesh members don't like his return.