cyberespionage
Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24
Insight #1: North Korean IT spies The threat of state-sponsored cyber espionage is real and evolving. Recent reports reveal North Korean IT professionals are using stolen identities and advanced tactics to infiltrate ...
From Geopolitics to Boardrooms: The Impact of the Kaspersky Ban
On the heels of the recent U.S. ban on Kaspersky antivirus software, it was expected that Kaspersky would begin to remove resources in the U.S. However, few expected them to lay off ...
Suspect Indicted in North Korea Group’s Expansive Spying Operation
North Korea's APT45 threat group is using ransomware attacks on U.S. health care firms to fund an ongoing cyberespionage campaign to steal military and defense secrets that are fed back into the ...
TA547 Phishing Attack: German Companies Hit With Infostealer
Researchers at Proofpoint have found out that the TA547 phishing attack campaigns have been targeting different German companies. Identified as TA547, the threat actor has been using an information stealer called Rhadamanthys ...
Cybersecurity Insights with Contrast CISO David Lindner | 4/12/24
Insight #1 I was at the Kernelcon conference last week and heard that Gen AI is going to wreck development because there will be more vulnerabilities than ever. In the same breath, ...
Cybersecurity Insights with Contrast CISO David Lindner | 4/12/24
Insight #1 I was at the Kernelcon conference last week and heard that Gen AI is going to wreck development because there will be more vulnerabilities than ever. In the same breath, ...
Fake Signal and Telegram Apps in the Google Play Store
Google removed fake Signal and Telegram apps from its Play store. An app with the name Signal Plus Messenger was available on Play for nine months and had been downloaded from Play ...
NSA Employee Charged with Espionage
An ex-NSA employee has been charged with trying to sell classified data to the Russians (but instead actually talking to an undercover FBI agent). It’s a weird story, and the FBI affidavit ...
Security Vulnerabilities in Covert CIA Websites
Back in 2018, we learned that covert system of websites that the CIA used for communications was compromised by—at least—China and Iran, and that the blunder caused a bunch of arrests, imprisonments, ...
Cybereason Discloses Attack Vector Used by Chinese Cybergang to Steal IP
The Cybereason Nocturnus Incident Response Team today divulged how cybercriminals affiliated with the Chinese Winnti APT group compromised enterprise resource planning (ERP) applications in Windows environments. Dubbed Operation CuckooBees, the cyberespionage attacks ...