Kiev Cyber Police Division and law enforcement agencies are interested in improving the situation with the legislative settlement of the issue of collecting digital evidence.
Intezer cyber security experts: Tehran’s hackers is targeting Westat employees or organizations that use the company services with TONEDEAF 2.0 and VALUEVAULT 2.0 malware.
According to the cyber security experts, the threat actors at lease since early 2018 exploited the DNS hijacking to infiltrate in networks and steal sensitive information.
BuzzFeed: People spread false-unverified information about missile attack on US Bases in Iraq. Tehran’s hackers will also try to hit American ICS with wiper attacks and spy the enemy.
Secureworks cyber security experts: It’s likely based in China and attacks NGO’s networks, political and law enforcement organizations. It has malware development capabilities.
The cyber security experts analyzed Operation Woocao, that targeted business and governments in 10 countries, to understand Chinese state-sponsored hackers modus operandi.
The cyber security experts: The North Korea’s APT malicious code has a very low detection rate. It’s hosted in a cryptocurrency trading platform. The campaign is similar to Operation AppleJeus.
FBI shared some advices to increase cyber security of these IoT devices. If users don’t manage correctly all the Internet-linked features, risks of being compromised can be high.