A botnet dubbed Hajime uses much the same tactics as Mirai – but to neutralise the damage done. Is this a good thing, though? Source: Sophos
A botnet dubbed Hajime uses much the same tactics as Mirai – but to neutralise the damage done. Is this a good thing, though? Source: Sophos
How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Several zero-days, as well as a bunch of merely ‘severe’ exploits apparently used in-the-wild were disclosed, and it is not yet clear whether this represents […]
Is your Online Privacy safe? Over the last few weeks, there have been numerous articles from tier one media outlets, claiming the acceptance of the privacy bill will completely remove every bit of online confidentiality away from US internet users. The news made global headlines at the end of March, and it has been a […]
As more and more pieces of our environment get connected to the Internet, the number of potential targets of a cyberattack becomes staggering, and the possible consequences become increasingly worrisome. Take what happened recently in Dallas, TX, where most of the city’s population was woken up in the middle of the night to the […]
Most spam, especially the sort that is mass-mailed on behalf of businesses, has quite an impersonal format: spammers create a message template for a specific mailing purpose and often drastically diversify the contents of that template. Generally, these kinds of messages do not personally address the recipient and are limited to common phrases such as […]
National elections have become a global stage for hackers to display their virtuosity, bringing the question of cybersecurity to the forefront of the conversation. Since Barack Obama accused the Russians of meddling in 2016’s presidential election in favor of Donald Trump, several European countries have taken their own measures to avoid such cyberattacks. Recently, the vulnerability of […]
We’re all familiar with the massive data leaks that Yahoo suffered last year. But until recently, we had very little in the way of clues as to who was behind the attacks which started at the beginning of 2014. As more evidence comes to light, it’s becoming increasingly apparent that this is not your run-of-the-mill […]
Why should you update your Android device’s operating system? Two words. Ghost Push. The well known trojan has had various iterations and it’s often updated to bypass new security updates. At its peak, Ghost Push infected over 600,000 Android devices daily, a colossal number. The trojan is capable of rooting phones, displaying revenue-generating ads that […]
Yesterday, our colleagues from Symantec published their analysis of Longhorn, an advanced threat actor that can be easily compared with Regin, ProjectSauron, Equation or Duqu2 in terms of its complexity. Longhorn, which we internally refer to as “The Lamberts”, first came to the attention of the ITSec community in 2014, when our colleagues from FireEye […]