Threat actors try to meddle the votes, starting from the one for the European Parliament, by cyber means. Here’s how to counter attacks, data leaks and fake news.
Yoroi-Cybaze cyber security experts: The core of the bot is the brute-force module. It has 23 functionalities to target a range of technologies, WordPress and Joomla included.
VpnMentor cyber security experts: Third parties could launch targeted cyber attacks and espionage, endangering people's economical and physical security.
The cyber attack hit especially Israeli websites, as part of #OpJerusalem. It demonstrates the risk for the cyber security of using unsecured third party plug-ins.
Cyber security researcher nicknamed The Sphinx programmed is own version, to understand how it works. Its main elements are: Stealthy, Powerful and Extensible.
Sucuri cyber security experts: To lure the victims are used 2 well known social engineering techniques: impersonification and panic/bait with phishing emails.
Yoroi-Cybaze cyber security experts: The threat actor realized a complex implant leveraging an ecosystem of libraries to conduct his cyber warfare operation.
Check Point cyber security experts: There are gaps in management of inputs within the "unacev2.dll" library. Yoroi: If not necessary, block the ACE archives.
The cyber security researchers: It was discovered and removed last year, but now is promoted by cybercrime and well visible. It spreads the Anubis banking trojan.
The Asan Institute for Policy Studies: Pyongyang is concentrating its cyber warfare on hacking financial institutions to reduce the impact of international sanctions.