Volatile Cedar Cyber Spying Op May Not Be the Work of a Foreign Country

Volatile Cedar Cyber Spying Op May Not Be the Work of a Foreign Country

Campaign focused on intelligence gathering since 2012

Most Victims Targeted by Volatile Cedar Group Are from Lebanon

Most Victims Targeted by Volatile Cedar Group Are from Lebanon

Infections also seen in US, UK, Canada, Israel and Russia

“Explosive” Malware Used by Cyber-Espionage Group Working from Lebanon

“Explosive” Malware Used by Cyber-Espionage Group Working from Lebanon

Volatile Cedar operation tied to Lebanese political group

French Intelligence Spy Tool “Babar” Analyzed

French Intelligence Spy Tool “Babar” Analyzed

No malware attribution from security researchers

DoubleFantasy Is Equation Group’s First Attack Wave

DoubleFantasy Is Equation Group’s First Attack Wave

Infection starts with running multiple exploits in a loop

Fanny Worm Has Been Freely Available for Download for Almost Five Years

Fanny Worm Has Been Freely Available for Download for Almost Five Years

Poster received no advice for malware removal until today

Anthem Network May Have Been Compromised Since April 2014

Anthem Network May Have Been Compromised Since April 2014

Hackers create alternate network to prepare the attack

iOS Devices Targeted by Cyber-Espionage Campaign

iOS Devices Targeted by Cyber-Espionage Campaign

Two spyware samples have been linked to Sednit malware

China Stole F-35 Fighter Jet Plans, Snowden Leak Confirms

China Stole F-35 Fighter Jet Plans, Snowden Leak Confirms

North Korea spied on through “fourth party” data collection

Havex RAT Authors Self-Sign Malware to Appear from IBM, 64-Bit Version Spotted

Havex RAT Authors Self-Sign Malware to Appear from IBM, 64-Bit Version Spotted

Threat actors are expected to continue to modify the threat

Angela Merkel’s Staff Member Targeted with Regin Advanced Persistent Threat

Angela Merkel’s Staff Member Targeted with Regin Advanced Persistent Threat

Malware infects USB of senior aide, is stopped by antivirus

FBI “Flash” Report Warns US Businesses of Iran-Based Hacking Activities <em>Reuters</em>

FBI “Flash” Report Warns US Businesses of Iran-Based Hacking Activities Reuters

Attacks initiated from IP addresses from Iran

Solaris Boxes Possibly Targeted by Linux Turla Backdoor, Too

Solaris Boxes Possibly Targeted by Linux Turla Backdoor, Too

Researchers expect to see Solaris machines infected by Turla

Kaspersky Launches Map of Advanced Persistent Threats

Kaspersky Launches Map of Advanced Persistent Threats

Collection of rare, advanced malware with useful information

Predictions for APT Attacks Go from Bad to Worse in 2015

Predictions for APT Attacks Go from Bad to Worse in 2015

Complexity of cyber-espionage campaigns will increase, more threat actors will join the cyber war scene

Red October Cyber Spy Op Goes Mobile via Spear-Phishing

Red October Cyber Spy Op Goes Mobile via Spear-Phishing

Malware ready for Android, iOS and BlackBerry, over 60 mobile operators included in the preparations

Red October Cyber Espionage Campaing Resurrected with “Cloud Atlas” Malware

Red October Cyber Espionage Campaing Resurrected with “Cloud Atlas” Malware

Threat actor targets the same victim profile, most victims have been detected in Russia and Kazakhstan

 
Want more? Browse: