Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

North Korean Cyberspies Target Govt Officials with Custom Malware
North Korean Cyberspies Target Govt Officials with Custom Malware
North Korean Cyberspies Target Govt Officials with Custom Malware
North Korean Cyberspies Target Govt Officials with Custom Malware

North Korean Cyberspies Target Govt Officials with Custom Malware

North Korean Cyberspies Target Govt Officials with Custom Malware A state-sponsored North Korean threat actor tracked as TA406 was recently observed deploying custom info-stealing malware in espionage campaigns. The particular actor is attributed as one of several groups known as Kimsuky (aka Thallium). TA406has left traces of low-volume activity since 2018, primarily focusing on espionage, money-grabbing scams, and

FBI Warns of APT Group Exploiting FatPipe VPN Zero-day Since May

FBI Warns of APT Group Exploiting FatPipe VPN Zero-day Since May The Federal Bureau of Investigation (FBI) warned of an advanced persistent threat (APT) compromising FatPipe router clustering and load balancer products to breach targets’ networks. FatPipe is a Salt Lake City computer networking hardware firm headquartered specializing in WAN optimization solutions with many Fortune 1000 companies on its customer

RedCurl Corporate Espionage Hackers Resume Attacks with Updated Tools

RedCurl Corporate Espionage Hackers Resume Attacks with Updated Tools A crew of highly-skilled hackers specialized in corporate espionage has resumed activity, one of their victims this year being a large wholesale company in Russia. Tracked as RedCurl, the group attacked the Russian business twice this year, each time using carefully constructed spear-phishing emails with initial-stage

Most SS7 Exploit Service Providers on Dark Web are Scammers

Most SS7 Exploit Service Providers on Dark Web are Scammers The existence of Signaling System 7 (SS7) mobile telephony protocol vulnerabilities is something security researchers warned about in 2016, and it only took a year before the first attacks exploiting them were observed. In the years that followed, governments exploited SS7 flaws to track individuals abroad, and

× Chat with us