ESET APT Activity Report T2 2022
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022 The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity
Cyber News, Cyber Threat TrendsAn overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022 The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity
Cyber News, Cyber Threat TrendsACM.111 Separate your data and resources from your executable code This is a continuation of my series of posts on Automating Cybersecurity Metrics. The last post provided some suggestions pertaining to how CloudFormation could be improved. How to Fix CloudFormation This post explains how using CloudFormation can help you secure your AWS account. Have you ever […]
Cyber News, Cyber Threat TrendsEntities located in East and Southeast Asia as well as Ukraine have been targeted at least since 2020 by a previously undocumented subgroup of APT41, a prolific Chinese advanced persistent threat (APT). Cybersecurity firm Trend Micro, which christened the espionage crew Earth Longzhi, said the actor’s long-running campaign can be split into two based on the toolset deployed to […]
Cyber News, Cyber Threat TrendsIn the second part of this blog series on Unscrambling Cybersecurity Acronyms, we covered Endpoint Detection and Response (EDR) and Managed Endpoint Detection and Response (MEDR) solutions, which included an overview of the evolution of endpoint security solutions. In this blog, we’ll go over Managed Detection and Response (MDR) and Extended Detection and Response (XDR) […]
Cyber News, Cyber Threat TrendsThe International Committee of the Red Cross wants some digital equivalent to the iconic red cross, to alert would-be hackers that they are accessing a medical network. The emblem wouldn’t provide technical cybersecurity protection to hospitals, Red Cross infrastructure or other medical providers, but it would signal to hackers that a cyberattack on those protected […]
Cyber News, Cyber Threat TrendsSoftware developers know not to reinvent the wheel. So, they lean on reusable micro-services – and their corresponding application programming interfaces (APIs) – as building blocks for application components. “Developers want to focus on the added value they can bring instead of rebuilding things that have great solutions out there already,” says Grace Francisco, vice president […]
Cyber News, Cyber Threat TrendsThreat actors claim they’ll destroy victims’ reputation if they don’t pay
Cyber News, Cyber Threat TrendsA new malicious campaign has compromised over 15,000 WordPress websites in an attempt to redirect visitors to bogus Q&A portals. “These malicious redirects appear to be designed to increase the authority of the attacker’s sites for search engines,” Sucuri researcher Ben Martin said in a report published last week, calling it a “clever black hat SEO trick.” The search […]
Cyber News, Cyber Threat TrendsA penetration test (also known as a pentest) is a security assessment that simulates the activities of real-world attackers to identify security holes in your IT systems or applications. The aim of the test is to understand what vulnerabilities you have, how they could be exploited, and what the impact would be if an attacker […]
Cyber News, Cyber Threat Trends