Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits

Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits

Posted by AngelaWong, 16-08-2020

Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets. Researchers are war...

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

Posted by AngelaWong, 16-08-2020

A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory. UPDATE The U.S. government is warning of new malware, dubbed Drovo...

Is Your Mac Really Safe? Let’s Take a Look Into It

Is Your Mac Really Safe? Let’s Take a Look Into It

Posted by AngelaWong, 15-08-2020

Is Your Mac Really Safe? Let’s Take a Look Into It Mac computers have enjoyed decades of a reputation of being safer than their Windows counterparts. However, that reputation is now dwind...

IcedID Shows Obfuscation Sophistication in New Campaign

IcedID Shows Obfuscation Sophistication in New Campaign

Posted by AngelaWong, 15-08-2020

The malware's developers have turned to dynamic link libraries (DLLs) to hide their work.   IcedID is malware that, like many others, is constantly evolving to avoid detection. Recently, resear...

How To Preemptively Track Phishing Campaigns

How To Preemptively Track Phishing Campaigns

Posted by AngelaWong, 10-08-2020

  Understanding vulnerabilities and the threat matrix to your enterprise was always an effective way to ensure cogent cyber defense of your organization. Reacting to phishing attacks in real-tim...

Incident Of The Week: Russia Utilizes Hacking 101 Strategies Toward Government And Energy Sector Targets

Incident Of The Week: Russia Utilizes Hacking 101 Strategies Toward Government And Energy Sector Targets

Posted by AngelaWong, 10-08-2020

Records Exposed: Undisclosed  |  Industry: Government and Energy  |  Type Of Attack: Spear Phishing, Malware, Brute Force, Zero-Day] The Russian Hacker group Fancy Bear poses an o...