FireEye cyber security experts: Malicious hackers masqueraded as a member of Cambridge University, used LinkedIn to deliver malicious documents and three new malware families.
ZDNet: Local ISPs have been instructed to force their respective users into installing a government-issued certificate on all devices. Formally to improve te cyber security.
ESET cyber security experts: The malware is a dynamic-link library that is installed and loaded by two earlier-stage components, and it’s periodically implemented to avoid detection.
U.S. Cost Guard issues a Safety Alert with recommended cyber security best practices. It’s seem the ICT extension of the Iranian aggressive campaign in the Hormuz Strait.
Trend Micro cyber security experts: The code has evolved in a banking malware combining information theft and ransomware. It targets 188 banking and finance related apps worldwide.
Microsoft Defender ATP cyber security experts: Telemetry showed a sudden increase in the use of WMIC tool to run a script. This led researchers discovery the cyber attack.
Trend Micro cyber security experts: The first malicious code abuses user account control (UAC) bypass and works as a loader for other threats. The second is a dangerous backdoor.
The Agency suffered a hug data breach with approximately 500 MB of data related to Mars missions stolen. The cyber security experts: It’s the work of an APT.