Overcoming the Limitations of VPN, NAC, and Firewalls with Zero Trust Access
During 2020 and 2021, we’ve seen ransomware-as-a-service wreak havoc in the IT supply chain and critical infrastructure. Below we explore how technologies and approaches to help protect organizations from these…
Android.Cynos.7.origin trojan infected +9 million Android devices
Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 games on Huawei’s AppGallery catalog (i.e. simulators, platformers, arcades, strategies, and shooters)…
Attackers deploy Linux backdoor on e-stores compromised with software skimmer
Researchers discovered threat actors installing a Linux backdoor on compromised e-commerce servers after deploying a credit card skimmer into e-stores. Security researchers from Sansec Threat Research Team discovered a Linux…
Iran-linked APT groups continue to evolve
The researchers at Microsoft Threat Intelligence Center (MSTIC) are warning of increasingly sophisticated operations carried out by Iranian threat actors. The Microsoft Threat Intelligence Center (MSTIC) shared the results of…
What To Know to Fight Against Cyber Attacks
By Gergo Varga, Senior Content Manager / Evangelist at SEON Cyber attacks have become a part of our reality, not only that we are all constantly getting phishing emails, but…
Forensic Collections From a Mac: Challenges & Solutions
INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches without first understanding some critical differences between Operating systems (HFS+, APFS, and…
Application Modernization and Other Best Practices of Securing Legacy Infrastructures
By Roman Davydov, Technology Observer, Itransition Legacy systems continue to play a vital role in the operations of many enterprises. However, over time, things like poor user adoption, increased maintenance…
Modern Times, Old Prejudices
The Hacker Era By Jordan Marcus Bonagura The century of constant acceleration Twenty-first century, more than a century of human evolution and great changes, a century of constant acceleration. Everything…
Twitch data breach updates: login credentials or card numbers not exposed
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent file posted on 4chan. An anonymous 4chan user has published…
Source Code Protection Market
Do we need GitHub and Bitbucket backup software? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, the software is the driving force of the world, and developers are…
Threat actors exploit a flaw in Coinbase 2FA to steal user funds
Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw to bypass 2FA authentication. Threat actors have exploited a vulnerability…
Russia-linked Nobelium APT group uses custom backdoor to target Windows domains
Microsoft discovered new custom malware, dubbed FoggyWeb, used by the Nobelium cyberespionage group to implant backdoor in Windows domains. Microsoft Threat Intelligence Center (MSTIC) researchers have discovered a new custom…