article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

According to iDefense, in 2006 the group was responsible for crafting a rootkit that took advantage of a zero-day vulnerability in Microsoft Word, and was used in attacks on “a large DoD entity” within the USA. “SonarX served as an easily searchable repository for social media data that previously had been obtained by CHENGDU 404.”

Antivirus 355
article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

GHz and 5 GHz bands, providing high-speed wireless internet connectivity (Kurkovsky, 2006). Wireless communication is susceptible to diverse security challenges such as eavesdropping, data interception, and unauthorized access (Chen, 2015). A Comprehensive Approach to Data Privacy in the Cloud. H., & Yau, K. Kurkovsky, S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

As Manufacturers Modernize Operational Technology, Closing Security Holes is a Growing Priority

CyberSecurity Insiders

The next phase of OT security will be adopting stable cloud infrastructures for storing big data from both a manufacturer and its customers, ISG predicts. By combining these in a data lake, companies will be able to apply machine-learning algorithms to gain additional insights and recommendations.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments. BVP Investments.