article thumbnail

The FBI warns of HiatusRAT scanning campaigns against Chinese-branded web cameras and DVRs

Security Affairs

In this latest campaign, our investigation also uncovered prebuilt Hiatus binaries that target new architectures such as Arm, Intel 80386, and x86-64 and previously targeted architectures such as MIPS, MIPS64, and i386. reads the report published by Black Lotus Labs. Attackers also attempted to exploit weak vendor-supplied passwords.

article thumbnail

Deloitte denied its systems were hacked by Brain Cipher ransomware group

Security Affairs

In September 2017, theaccountancy firm giant revealed thatwas targeted by a sophisticated attack that compromised the confidential emails and plans of some of its blue-chip clients. In addition to emails, hackers had potential access to IP addresses, architectural diagrams for businesses and health information.

Hacking 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Triada Trojan comes preinstalled on Android devices

Security Affairs

The most interesting characteristic of the Triada Trojan is its modular architecture, which gives it theoretically a wide range of abilities. In July 2017, Dr.Web researchers discovered many smartphonemodels were shipped with the dreaded Triada trojan such as Leagoo M5 Plus, Leagoo M8, Nomu S10, and Nomu S20.

article thumbnail

APT group exploited Output Messenger Zero-Day to target Kurdish military operating in Iraq

Security Affairs

Marbled Dust has been active since at least 2017 and primarily targets organizations in Europe and the Middle East. Between 2017 and 2019, the APT group mainly used DNS hijacking in its campaigns. Microsoft researchers believe the group selects this method based on reconnaissance, confirming the use of the app.

DNS 86
article thumbnail

NIST’s Post-Quantum Cryptography Standards

Schneier on Security

In 2017, NIST received eighty-two post-quantum algorithm submissions from all over the world. It took a couple of decades to fully understand von Neumann computer architecture; expect the same learning curve with quantum computing. Then, with input from the cryptographic community, NIST crowns a winner.

article thumbnail

Crosspost: A Simple SOAR Adoption Maturity Model

Anton on Security

For example, in my analyst days, I built a maturity model for a SOC (2018) , a SIEM deployment (2018) and vulnerability management (2017). Thanks to Google SOAR Solution Architecture Manager Oleg Siminel , and others from the Siemplify field team, for their support here. Guess which one is missing? The one for SOAR!

article thumbnail

Evaluating the NSA's Telephony Metadata Program

Schneier on Security

The first concern was over high numbers: in both 2016 and 2017, the Foreign Intelligence Surveillance Court issued 40 orders for collection, but the NSA collected hundreds of millions of CDRs, and the agency provided little clarification for the high numbers. For a time, the new program seemed to be functioning well.