Cyber security researcher nicknamed The Sphinx programmed is own version, to understand how it works. Its main elements are: Stealthy, Powerful and Extensible.
Sucuri cyber security experts: To lure the victims are used 2 well known social engineering techniques: impersonification and panic/bait with phishing emails.
Yoroi-Cybaze cyber security experts: The threat actor realized a complex implant leveraging an ecosystem of libraries to conduct his cyber warfare operation.
The Asan Institute for Policy Studies: Pyongyang is concentrating its cyber warfare on hacking financial institutions to reduce the impact of international sanctions.
Also Italy is affected. MalwareMustDie cyber security experts: bad actors steal info from weak sites, then target finance payment portals and online banking sites.
Sucuri cyber security experts: We discovered a very well hidden encoded spam injector malware in an unsuspicious file, that was disguised as a theme’s license key.
Safety Detective’s research labs cyber security expert, Noam Rotem, discovered a major vulnerability that could affect tens of millions of travelers.
Two hackers forced dozens of thousands of devices to play pro-PewDiePie video, because many people left their Google Chromecasts and smart televisions wide open.
The first data breach of 2019 happened in Australia. Someone stolen the details of an estimated 30,000 civil servants in Victoria state, thanks to a phishing cyber attack. The first data breach in 2019 happened less than 24 hours into…
President Recep Tayyp Erdogan announced that the home-home-made cyber security software stopped the attempt. Maybe it’s related on what’s happening in Syria.