Successful Malware Incidents Rise as Attackers Shift Tactics

As employees moved to working from home and on mobile devices, attackers followed them and focused on weekend attacks, a security firm says. Companies relaxed security controls to help employees to be productive during the coronavirus pandemic, leading attackers to shift their tactics and take advantage of the chaos caused

0 Comments

CES 2021: Car spying – your insurance company is watching you

Your ‘networked computer on wheels’ has a privacy problem – when it comes to your data, you may not really be in the driver’s seat The CES 2021 conference heralds the natural progression of car-spying apps built directly into the car and tied directly to insurance companies. Originally slated to

0 Comments

How next-gen cloud SIEM tools can offer critical visibility companies for effective threat hunting

Virtual workforces face escalated threats due to their remote access from various networks. Learn how security information and event management tools can help in the battle. Image: iStock/Undefined Undefined More about cybersecurity As a system administrator, I had quite a tech support ordeal the other day in which I found

0 Comments

Researchers Disclose Undocumented Chinese Malware Used in Recent Attacks

Cybersecurity researchers have disclosed a series of attacks by a threat actor of Chinese origin that has targeted organizations in Russia and Hong Kong with malware — including a previously undocumented backdoor. Attributing the campaign to Winnti (or APT41), Positive Technologies dated the first attack to May 12, 2020, when

0 Comments

US government warns of cyberattacks targeting cloud services

Such attacks often occur when employees work remotely and use a mixture of personal and business devices to access cloud services. Image: Leo Wolfert Organizations with remote workers who use cloud-based services are being warned of several recent successful cyberattacks against those services. SEE: Social engineering: A cheat sheet for

0 Comments

Shifting Privacy Landscape, Disruptive Technologies Will Test Businesses

A new machine learning tool aims to mine privacy policies on behalf of users. Aiming to correct the privacy imbalance between consumers and businesses, a group of academics released a tool that uses automation and machine learning to mine privacy policies and deliver easy-to-use options for a consumer to limit

0 Comments

How to install Eternal Terminal for persistent SSH connections

If you have trouble with SSH connections breaking, Jack Wallen shows you how you can enjoy a bit more persistence with the help of Eternal Terminal. Image: iStock/vadimrysev If you’re an admin with Linux servers in your data center or cloud hosted account (such as AWS and Google Cloud), chances

0 Comments

Facebook: Malicious Chrome Extension Developers Scraped Profile Data

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

Hackers leak stolen COVID‑19 vaccine documents

The documents related to COVID-19 vaccine and medications were stolen from the EU’s medicines agency last month The European Medicines Agency (EMA), which evaluates and approves medicines for the European Union (EU), has disclosed that cybercriminals have posted online a portion of the documents that are related to COVID-19 vaccines

0 Comments

‘Chimera’ Threat Group Abuses Microsoft & Google Cloud Services

Researchers detail a new threat group targeting cloud services to achieve goals aligning with Chinese interests. Security researchers are watching a threat group that takes advantage of Microsoft and Google cloud services with the goal of exfiltrating data across a broad range of target organizations. These attackers have a “wide

0 Comments