North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit
A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North…
Friday Squid Blogging: Economic Fallout from Falklands Halting Squid Fishing
Details. Blog moderation policy. Details. Blog moderation policy. Read More
Commercial Spyware Vendors Have a Copycat in Top Russian APT
Russia’s Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics. Russia’s Midnight…
Commercial Spyware Vendors Have a Copycat in Top Russian APT
Russia’s Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics. Russia’s Midnight…
‘Voldemort’ Malware Curses Orgs Using Global Tax Authorities
The global malware campaign (that must not be named?) is targeting organizations by impersonating tax authorities, and using custom tools…
NASA Focuses on Cybersecurity of its Mission-Critical Software
The software verification and validation efforts helps NASA improve the safety and cost-effectiveness of its mission critical software. Cybersecurity is…
Cyberattackers Exploit Google Sheets for Malware Control in Global Espionage Campaign
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected…
Why Identity Teams Need to Start Reporting to the CISO
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it’s…