[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Government and military organisations in Southeast Asia seem to be a target of cyber espionage campaign. It is most likely state-sponsored and has been named “Lotus Blossom” by Palo Alto Unit 42. This adversary group is very well organised and may have the support from a country that has interest in Southeast Asia. To date, […]

IT News

Normally, I don’t cover vulnerabilities about which the user can do little or nothing to prevent, but two newly detailed flaws affecting hundreds of millions of Android, iOS and Apple products probably deserve special exceptions. The first is a zero-day bug in iOS and OS X that allows the theft of both Keychain (Apple’s password management […]

The damaging effects of cybercrime are bound not only to a matter of bad image and corporate reputation, but they also cause significant economic losses to companies and individuals who suffer from this type of incident. In fact, this figure is increasing, according to a report recently released by the information technology consultant Juniper Research, […]

The Spring Dragon APT
June 17, 2015

Let’s examine a couple of interesting delivery techniques from an APT active for the past several years, the Spring Dragon APT. A paper released today by our colleagues at Palo Alto Networks presented a portion of data on this crew under the label “the Lotus Blossom Operation“, likely named for the debug string present in much of the […]

IT News

LastPass, a company that offers users a way to centrally manage all of their passwords online with a single master password, disclosed Monday that intruders had broken into its databases and made off with user email addresses and password reminders, among other data. In an alert posted to its blog, LastPass said the company has […]

IT News
Catching Up on the OPM Breach
June 15, 2015

I heard from many readers last week who were curious why I had not weighed in on the massive (and apparently still unfolding) data breach at the U.S. Office of Personnel Management (OPM). Turns out, the easiest way for a reporter to make sure everything hits the fan from a cybersecurity perspective is to take a […]

The Duqu 2.0 persistence module
June 15, 2015

We have previously described how Duqu 2.0 doesn’t have a normal “persistence” mechanism. This can lead users to conclude that flushing out the malware is as simple as rebooting all the infected machines. In reality, things are a bit more complicated. The attackers created an unusual persistence module which they deploy on compromised networks. It […]