Advanced Persistent Threats (APTs) represent a growing and dangerous facet of today’s cybersecurity threat framework – one whose resources and expertise greatly outnumber those of the more traditional cyber-attacks observed of past. These targeted attacks can remain undetected from months to years as they stealthily enumerate and exfiltrate valuable digital
Topic: Advanced Persistent Threat (APT)
Hackers linked with foreign governments continue to target multiple global health care organizations and pharmaceutical companies in a possible bid to gather intelligence or steal research related to the coronavirus pandemic, American and British cybersecurity agencies said Tuesday.
Earlier this year, state-backed Chinese hackers embarked on one of the most sweeping Chinese espionage campaigns FireEye has seen in years, according to new research the security firm published Wednesday.
A threat actor referred to as POISON CARP has targeted senior members of Tibetan groups via WhatsApp for around six months, Citizen Lab reveals.
The Treasury's Office of Foreign Assets Control announced Friday it is sanctioning three North Korean hacking groups it says are backed by Kim Jong-un's regime, including the well-known Lazarus Group. The office also identifies two sub-groups of Lazarus Group, Bluenoroff and Andariel.
North Korea has generated an estimated $2 billion for its weapons of mass destruction programs using "widespread and increasingly sophisticated" cyberattacks to steal from banks and cryptocurrency exchanges, according to a confidential U.N. report seen by Reuters on Monday.
Early this spring, Russian government-linked hackers used three popular internet of things devices with weak security to access several Microsoft customers' networks, then tried infiltrating more privileged accounts, researchers announced Monday.
In late May 2018, security researchers announced that specific consumer-grade electronic devices had been infected by a type of malware referred to as the VPNFilter. Only a couple of days after this information was disclosed, several agencies of the United States Government issued a warning to users of these compromised devices, strongly advising them of
The revelation brings to five the number of groups tracked by Dragos that go after the oil and gas sector, highlighting the growing interest shown by well-resourced hackers in probing the industrial control systems (ICS) that underpin energy infrastructure. Oil and gas companies move markets and are strategic national assets, giving cyber operatives plenty
The Iran-linked cyber-espionage group OilRig has started using three new malware families in campaigns observed over the past month, FireEye reports.